Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged To

Rss Feed Group items tagged

realcounterfeits

Buy North Carolina Driver's License - Buy genuine driving licence online - 0 views

  •  
    North Carolina Driver's License for sale - Buy genuine driving licence Are you looking to buy a North Carolina driver's license online? Do you need a driving grant in North Carolina? Have you been attempting to venture out to North Carolina? Do you need archives you cannot have? You are in the perfect spot at the perfect time if your answer is Yes. As the most renowned fake driver's license for sale online in North Carolina, UK, and Europe, we have a team of most competent, experienced and skilled employees who know how to recreate the exact features in the same way as the Department of Motor Vehicles (DMV) performs. If you are searching for the best place to get a fake driver's license online for North Carolina, UK, and Europe, look no farther than realcounterfeitsmoney.com Separate technicians are assigned to recreate different state and country license. When you buy fake IDs online for North Carolina, UK, and Europe, you find a special team entrusted with the task of creating a fake license. Reasons why you need to get a Driver's License online from us At realcounterfeitsmoney, we produce both Registered and Unregistered North Carolina Driver's License. Registered Driver's License: For the enlisted North Carolina DL, we register all your data into the North Carolina information base framework. Whenever checked to utilize an information understanding machine, your subtleties will obviously appear in the framework %100 genuine. Consequently, you will have the option to legitimately utilize it anyplace since it has no distinction with the one given by the legislature. Unregistered Driver's License: we additionally produce an unregistered North Carolina Driver's License that looks precisely like the enrolled duplicate yet no data enlisted in the information base. The report will be second hand. All mystery highlights of the government-provided visa will be copied and engraved on this Fake duplicate. We generally encourage our customers to let
  •  
    North Carolina Driver's License for sale - Buy genuine driving licence Are you looking to buy a North Carolina driver's license online? Do you need a driving grant in North Carolina? Have you been attempting to venture out to North Carolina? Do you need archives you cannot have? You are in the perfect spot at the perfect time if your answer is Yes. As the most renowned fake driver's license for sale online in North Carolina, UK, and Europe, we have a team of most competent, experienced and skilled employees who know how to recreate the exact features in the same way as the Department of Motor Vehicles (DMV) performs. If you are searching for the best place to get a fake driver's license online for North Carolina, UK, and Europe, look no farther than realcounterfeitsmoney.com Separate technicians are assigned to recreate different state and country license. When you buy fake IDs online for North Carolina, UK, and Europe, you find a special team entrusted with the task of creating a fake license. Reasons why you need to get a Driver's License online from us At realcounterfeitsmoney, we produce both Registered and Unregistered North Carolina Driver's License. Registered Driver's License: For the enlisted North Carolina DL, we register all your data into the North Carolina information base framework. Whenever checked to utilize an information understanding machine, your subtleties will obviously appear in the framework %100 genuine. Consequently, you will have the option to legitimately utilize it anyplace since it has no distinction with the one given by the legislature. Unregistered Driver's License: we additionally produce an unregistered North Carolina Driver's License that looks precisely like the enrolled duplicate yet no data enlisted in the information base. The report will be second hand. All mystery highlights of the government-provided visa will be copied and engraved on this Fake duplicate. We generally encourage our customers to let
wasifali

Housnat juicer for whole fruit - 0 views

image

started by wasifali on 03 Jul 23 no follow-up yet
wasifali

Housnat juicer for whole fruit - 0 views

image

started by wasifali on 03 Jul 23 no follow-up yet
Anne Bubnic

Cyber Safety/Social Networking Safety Measures - 0 views

  • For the past two years Blumenthal and other states' attorneys general have negotiated with both Facebook and MySpace to implement more than 60 new safety measures to protect children from online predators and from gaining access to inappropriate content, like pornography.
  • Under the agreement with Facebook, its officials have agreed to prominently display safety tips, and to require users under the age of 18 to affirm that they have read the tips. Users over 18 can no longer search for under-18 users, and Facebook officials will automatically be notified when someone under 18 is in danger of providing personal information to an adult user.
  • Parents will also be provided with tools to remove a child's profile from the site. Inappro­priate images and content will be removed, and ads for age-restricted products, like alcohol and tobacco, will be limited to users old enough to purchase those items. Most significantly, Facebook agreed to diligently search for and remove profiles of registered sex offenders, and it will "in­crease efforts to remove groups for incest, pedophilia, cyber-bullying and other violations of the site's terms of service and expel from the site individual violators of those terms."
  • ...2 more annotations...
  • Under the agreement, MySpace now allows parents to submit their child's e-mail address to prevent anyone from using that e-mail address to set up a profile (e-mail addresses are required in order to set up an account for either Facebook or MySpace, and people may search for "friends" by entering e-mail addresses). For anyone under 16, MySpace will automatically set the profile to "private," allowing only approved people to view the profile. There is now a closed "high school" section of the site set aside for users under 18.
  • Like Facebook, MySpace officials will also "obtain and constantly update a list of pornographic Web sites and regularly sever any links" between the sites. MySpace agreed to provide a way to report abuse on every page that contains content. The site's officials also prom­ised to respond to complaints of inappropriate content within 72 hours.
  •  
    Connecticut Attorney General Richard Blumenthal has made it one of his priorities to install methods of protection for the state's children when it comes to using these Web sites, hoping to "make social networking safer," according to a press release generated by his office. Efforts by Facebook and MySpace to protect privacy are described in this article.
Anne Bubnic

Chatroulette: What's an Educator to Do? - 2 views

  • You never know who you are going to encounter: a predator? Someone sitting there naked?” asks Barnett. “All it would take is one such incident and the school will be sued by an angry parent. Our focus should be on helping students to learn to be cyber safe and we don't have to do that by actually being on Chatroulette.com.”
  •  
    On listservs and blogs, education researchers and teachers are beginning to discuss how to handle this latest online application. To most educators, filtering is never a preferred option. Teachers and media specialists almost uniformly choose to use opportunities like this to teach students how to make decisions about what's appropriate on their own. "One of the responsibilities of working with students on the use of online resources is to make them aware of potential dangers so they can make informed choices," says Deb Logan, librarian and media specialist for Mount Gilead (OH) High School, by email. "A discussion of online resources like Chatroulette offers a learning opportunity. These opportunities sometimes come at unexpected times." But educators believe Chatroulette may be a bit different then other similar sites like Omegle.com and Facebook's PopJam in that video is involved-and there's no way to edit what pops up on the screen other than clicking "next" after it's already appeared. There's no lurking allowed on Chatroulette-once a user signs in, they're visible to anyone who chances upon them, and anyone, in turn, is visible to them. Needless to say, there's a bit of nudity and sexual play being reported on the site, and the swiftness of people moving from image to image doesn't allow children to protect themselves-other than signing off.
Anne Bubnic

Protecting Your Online Identity and Reputation - 0 views

  • Remember that nothing is temporary online. The virtual world is full of opportunities to interact and share with people around the world. It's also a place where nothing is temporary and there are no "take-backs." A lot of what you do and say online can be retrieved online even if you delete it — and it's a breeze for others to copy, save, and forward your information.
  • Mark your profiles as private. Anyone who accesses your profile on a social networking site can copy or screen-capture information and photos that you may not want the world to see. Don't rely on the site's default settings. Read each site's instructions or guidelines to make sure you're doing everything you can to keep your material private.
  • Safeguard your passwords and change them frequently. If someone logs on to a site and pretends to be you, they can trash your identity. Pick passwords that no one will guess (don't use your favorite band or your dog's birthday; try thinking of two utterly random nouns and mixing in a random number), and change them often. Never share them with anyone other than your parents or a trusted adult. Not even your best friend, boyfriend, or girlfriend should know your private passwords!
  • ...6 more annotations...
  • Don't post inappropriate or sexually provocative pictures or comments. Things that seem funny or cool to you right now might not seem so cool years from now — or when a teacher, admissions officer, or potential employer sees them. A good rule of thumb is: if you'd feel weird if your grandmother, coach, or best friend's parents saw it, it's probably not a good thing to post. Even if it's on a private page, it could be hacked or copied and forwarded.
  • Don't respond to inappropriate requests. Research shows that a high percentage of teens receive inappropriate messages and solicitations when they're online. These can be scary, strange, and even embarrassing. If you feel harassed by a stranger or a friend online, tell an adult you trust immediately. It is never a good idea to respond. Responding is only likely to make things worse, and might result in you saying something you wish you hadn't.
  • Take a breather to avoid "flaming." File this one under "nothing's temporary online": If you get the urge to fire off an angry IM or comment on a message board or blog, it's a good idea to wait a few minutes, calm down, and remember that the comments may stay up (with your screen name right there) long after you've regained your temper and maybe changed your mind.
  • Learn about copyrights. It's a good idea to learn about copyright laws and make sure you don't post, share, or distribute copyrighted images, songs, or files. Sure, you want to share them, but you don't want to accidentally do anything illegal that can come back to haunt you later.
  • Check yourself. Chances are, you've already checked your "digital footprint" — nearly half of all online users do. Try typing your screen name or email address into a search engine and see what comes up. That's one way to get a sense of what others see as your online identity.
  • Take it offline. In general, if you have questions about the trail you're leaving online, don't be afraid to ask a trusted adult. Sure, you might know more about the online world than a lot of adults do, but they have life experience that can help.
  •  
    Advice for teens from www.kidshealth.org. Here are some things to consider to safeguard your online identity and reputation:
    1. Remember that nothing is temporary online
    2. Mark your profile as private.
    3. Safeguard your passwords and change them regularly.
    4. Don't post inappropriate or sexually provocative pictures or comments.
    5. Don't respond to inappropriate requests
    6. Take a breather to avoid "flaming."
    7. Learn about copyrights.
    8. Check your digital footprint.
    9. Take it offline.
Anne Bubnic

Curbing Cyberbullying in School and on the Web - 0 views

  • Many of the most egregious acts of cyberbullying do not take place during school hours or on school networks, a situation that presents a dilemma for public school administrators: If they punish a student for off-campus behavior, they could get hit with a freedom of speech suit.  If they do nothing, students may continue to suffer and school officials theoretically could get hit with failure to act litigation. For school administrators, it appears to be an unfortunate “catch-22.” For lawyers, it’s a “perfect storm,” pitting freedom of speech advocates against the victims of cyberbullying and schools that try to intervene. There are no easy answers in this arena, few laws, and no well-established precedents that specifically deal with cyberbullying.
  • “School administrators can intervene in cyberbullying incidents, even if the incidents do not take place on school grounds, if they can demonstrate that the electronic speech resulted in a substantial disruption to the educational environment.”
  • These cases illustrate not only a lack of precedent on cyberbullying cases, but also a dilemma for school administrators on how to handle cyberbullying.  “There are few laws that address how to handle cyberbullying, and many schools don’t have an internal policy to deal with cyberbullying that takes place off-campus,” offers Deutchman.  “It may take an unfortunate and tragic event on school property to get more schools to consider tackling electronic behavior that originates off campus.  It’s only a matter of time before a cyberbully, or the victim of cyberbullying, uses deadly force during school hours.”
  • ...5 more annotations...
  • So, what should schools do in the meantime?  First, school officials should establish a consistent internal policy (much like a crisis plan) and a team (minimally made up of the principal, school counselor, and technology director) to deal with cyber-misconduct. This team should fully document disruptive incidents and the degree to which the learning environment is affected. The principal should invite the cyberbully’s parents to review the offending material before considering disciplinary action. Most parents at this point will do the right thing.
  • Second, schools should educate children, starting in elementary school, about the importance of cyber-safety and the consequences of cyberbullying, especially on the school’s own network. These rules should be clearly posted in the computer labs and written in age-appropriate language. The rules should be sent home to parents each year—and they should be posted prominently on the school’s website.
  • Third, teachers should continue incorporating in their curriculum projects that utilize the web and other powerful new technologies. This probably won’t help schools avoid lawsuits; it’s just good pedagogy. It’s not surprising that schools that keep up with the latest technology and software—and employ teachers who care about the quality of online communication—report lower incidents of cyber-misconduct.
  • In addition, schools should update their codes of conduct to include rules that can legally govern off-campus electronic communication that significantly disrupts the learning environment. They should also assign enough resources and administrative talent to deal with students who engage in cyber-misconduct. One very big caveat: Disciplining a student for off-campus electronic speech should be done only as a last resort, and certainly not before seeking legal counsel.
  • Finally, schools should realize that not all cyberbullies need to be disciplined. Schools should act reasonably, responsibly, and consistently—so as to avoid the very bullying behavior they are trying to curb. Until the courts provide clear standards in the area of off-campus electronic speech for young people, these recommendations will go a long way in making schools a safer learning environment for everyone.
  •  
    Most school administrators have more than one story to tell about cyberbullying. They report that victims of cyberbullying experience low self-esteem, peer isolation, anxiety, and a drop in their grades. They note that victims may miss class or other school-related activities. Principals also point to recent high-profile cases where cyberbullying, left unchecked, led to suicide. In response, some schools have created new policies and curbed free speech on the school's computer network and on all electronic devices used during school hours. This article offers practical advice for actions schools can take to curb bullying, ranging from policy development to education.
Anne Bubnic

Eight Tips for Monitoring and Protecting Your Online Reputation - 9 views

  •  
    Here are 8 tips to monitor and protect one's online reputation from the U.S. Government Information Security Blog: Search your name. Type your first and last name within quotation marks into several popular search engines to see where you are mentioned and in what context. Narrow your search and use keywords that apply only to you, such as your city, employer and industry association. Expand your search. Use similar techniques to search for your telephone numbers, home address, e-mail addresses, and personal website domain names. You should also search for your social security and credit card numbers to make sure they don't appear anywhere online. Read blogs. If any of your friends or coworkers have blogs or personal web pages on social networking sites, check them out to see if they are writing about or posting pictures of you. Sign up for alerts. Use the Google alert feature that automatically notifies you of any new mention of your name or other personal information. Limit your personal information. Tweet/chat/discuss regarding business and the emerging trends in your industry, but limit posting information on your personal life, which could be a subject of major scrutiny by recruiters and hiring managers. Also, be sure you know how organizations will use your information before you give it to them. Use privacy settings. Most social networking and photo-sharing sites allow you to determine who can access and respond to your content. If you're using a site that doesn't offer privacy settings, find another site. Choose your photos and language thoughtfully. You need to ensure that information posted online is written professionally without use of swear words and catchy phrases. Also, be very selective in posting photographs, and use your judgment to ensure that these photographs are how you want the world to see you. Take action If you find information about yourself online that is embarrassing or untrue, cont
anonymous

Online Predators and Their Victims - 0 views

  • My (Liz B. Davis ) Summary of Key Points (All are quotes directly from the article): Online "Predators" and Their Victims. Myths, Realities, and Implications for Prevention and Treatment. by: Janis Wolak, David Finkelhor, and Kimberly J. Mitchell - University of New Hampshire and Michele L. Ybarra - Internet Solutions for Kids, Inc.
  • The publicity about online"predators" who prey on naive children using trickery and violence is largely inaccurate.
  • adult offenders who meet, develop relationships with, and openly seduce underage teenagers
  • ...21 more annotations...
  • In the great majority of cases, victims are aware they are conversing online with adults. In the N-JOV Study, only 5% of offenders pretended to be teens when they met potential victims online. (112)
  • Offenders rarely deceive victims about their sexual interests.
  • promises of love and romance
  • 99% of victims of Internet-initiated sex crimes in the N-JOV Study were 13 to 17 years old, and none were younger than 12. 48% were 13 or 14 years old. (115)
  • it was those 15-17 years of age who were most prone to take risks involving privacy and contact with unknown people. (115)
  • take place in isolation and secrecy, outside of oversight by peers, family  members, and others in the youth's face-to-face social networks (115)
  • Most of the online child molesters described in the N-JOV Study met their victims in chatrooms. In a 2006 study, about one third of youths who received online sexual solicitation had received them in chatrooms. (116)
  • Youth internet users with histories of offline sexual or physical abuse appear to be considerably more likely to receive online aggressive sexual solicitations. (117)
  • ..Although Internet safety advocates worry that posting personal information exposes youths to online molesters, we have not found empirical evidence that supports this concern. It is interactive behaviors, such as conversing online with unknown people about sex, that more clearly create risk. (117)
  • Online molesters do not appear to be stalking unsuspecting victims but rather continuing to seek youths who are susceptible to seduction. (117)
  • maintaining online blogs or journals, which are similar to social networking sites in that they often include considerable amounts of personal information and pictures, is not related to receiving aggressive sexual solicitation unless youths also interact online with unknown people. (117)
  • Boys constitute 25% of victims in Internet-initiated sex crimes, and virtually all of their offenders are male. (118
  • Some gay boys turn to the internet to find answers to questions about sexuality or meet potential romantic partners, and there they may encounter adults who exploit them. (118)
  • ..child molesters are, in reality, a diverse group that cannot be accurately characterized with one-dimensional labels. (118)
  • Online child molesters are generally not pedophiles. (118)Online child molesters are rarely violent. (119)
  • Child pornography production is also an aspect of Internet-initiated sex crimes. One in five online child molesters in the N-JOV Study took sexually suggestive or explicit photographs of victims or convinced victims to take such photographs of themselves or friends. (120)
  • Youths may be more willing to talk extensively and about more intimate matters with adults online than in face-to-face environments. (121
  • it may not be clear to many adolescents and adults that relationships between adults and underage adolescents are criminal. (122)
  • Simply urging parents and guardians to control, watch, or educate their children may not be effective in many situations. The adolescents who tend to be the victims of Internet-initiated sex crimes many not themselves be very receptive to the advice and supervision of parents. (122)
  • We recommend educating youths frankly about the dynamics of Internet-initiated and other nonforcible sex crimes. Youths need candid, direct discussions about seduction and how some adults deliberately evoke and then exploit the compelling feelings that sexual arousal can induce. (122)
    • anonymous
       
      Let's remember that although there are direct references to gay and male pedophiles of gay boys, that 99% of child sex offenders identify as heterosexual, online or offline.
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
  •  
    This research article has the facts about sexual predatory behavior.
Anne Bubnic

The Road to Cybersafety - 0 views

  • Carrill is part of the Platte County Sheriff’s Office. He also leads the Western Missouri Cyber Crimes Task Force. One of his primary missions is to track down and arrest online predators who trade in child pornography.And all these cameras only make his job more challenging. About 40 percent of the nation’s minors have access to Webcams, Carrill explained, devices for uploading live video to the Internet. About 65 percent of all children have access to cell phone cameras.
  • erhaps the biggest issue is that fact that kids don’t understand that when a picture is posted online, it’s nearly impossible to remove.“Once that image is taken, it’s out there forever,” Shehan said. “The No. 1 issue that we’ve seen with Webcams is teenagers self-producing pornography.”
  • All we can tell them is, ‘I’m sorry,’” Carrill said. “The minute the camera clicks, you no longer own that image. It has the potential to harm that person years from now.”A Webcam placed in a child’s bedroom is another bad combination, according to Shehan and Carrill. Sexual predators search for kids who use Webcams in the privacy of their own rooms, then lure or blackmail the child into providing pictures of themselves.“We see cases time after time of children who take pictures, send them to a predator and get a pornographic collage back that the predator uses to blackmail the child into providing more images,” Shehan said.
  • ...3 more annotations...
  • . About 40 percent of the nation’s minors have access to Webcams, Carrill explained, devices for uploading live video to the Internet. About 65 percent of all children have access to cell phone cameras.Carrill’s team recently started a new operation to search image-trading Web sites for known child pornography in Missouri. The results were frightening, he said. More than 6,000 images were found in the state; about 700 of those pictures were downloaded in the Kansas City area.Between sexual predators who fish for images and immature decisions by kids with cameras, more children are either having their images posted online or being exposed to pornography, according to a 2006 report by the National Center for Missing and Exploited Children.
  • In the end, the best tool to defeat child pornography is parent education, according to both Shehan and Carrill. More than anything, kids need to know they can trust their parents.“It’s through that open line of communication between the parent and child that they can work through or prevent bad situations,” Carrill said.
  • All parents should follow a few basic rules when it comes to cyber safety, according to experts:- Keep computers in common areas of the home.- Monitor Internet use by children.- Enable privacy protection software.- Turn Webcams off or protect them with a password.- Track what images are being uploaded by children in the household.- Talk to children about what is appropriate.
  •  
    Webcams, cell phone cameras being put to troubling use, experts say. People are taking pictures, lots of them, and then uploading them as permanent displays in the Internet collection.
adrinawinslet

8 Ways to Use Hashtags to Get More Likes on Social Media - 0 views

  •  
    Many people use hashtags, but not everyone uses them properly. We will unveil some ways to use hashtags properly, so your brand will get more likes and engagement on social media. Hashtags serve as a social media search tool- they help to tie different social media posts together that relate to a particular topic, making them easily searchable. Using hashtags in your social media posts ensures that a larger audience outside your own followers is able to see your post. It also helps your brand to get more attention and engagement when you use Trending Hashtags. 1. Use Just the Right Amount 2. Find Which Hashtags Are the Most Popular (Influencer Hashtags) 3. Find What Hashtags to Use For Your Particular Audience 4. Use the "CCC Rule" (Creative, Catchy or Comical) 5. Keep Your Hashtags Short and Simple 6. Optimize Your Account Settings for Hashtags 7. Use Branded Hashtags for Your Business 8. Use Hashtags Consistently Use hashtags to target specific audiences. Use hashtags to draw attention to specific marketing events or social movements. The best practice is to choose the right hashtag for the content and audience you want to reach. For More Information Visit: http://bit.ly/2YUxTop
Anne Bubnic

China to Limit Web Access During Olympic Games - NYTimes.com - 0 views

  • Since the Olympic Village press center opened Friday, reporters have been unable to access scores of Web pages — among them those that discuss Tibetan issues, Taiwanese independence, the violent crackdown on the protests in Tiananmen Square and the Web sites of Amnesty International, the BBC’s Chinese-language news, Radio Free Asia and several Hong Kong newspapers known for their freewheeling political discourse.
  • The restrictions, which closely resemble the blocks that China places on the Internet for its citizens, undermine sweeping claims by Jacques Rogge, the International Olympic Committee president, that China had agreed to provide full Web access for foreign news media during the Games. Mr. Rogge has long argued that one of the main benefits of awarding the Games to Beijing was that the event would make China more open.
  • But a high-ranking Olympic committee official said Wednesday that the panel was aware that China would continue to censor Web sites carrying content that the Chinese propaganda authorities deemed harmful to national security and social stability.
  • ...1 more annotation...
  • In its negotiations with the Chinese over Internet controls, the Olympic committee official said, the panel insisted only that China provide unregulated access to sites containing information useful to sports reporters covering athletic competitions, not to a broader array of sites that the Chinese and the Olympic committee negotiators determined had little relevance to sports. The official said he now believed that the Chinese defined their national security needs more broadly than the Olympic committee had anticipated, denying reporters access to some information they might need to cover the events and the host country fully. This week, foreign news media in China were unable to gain direct access to an Amnesty International report detailing what it called a deterioration in China’s human rights record in the prelude to the Games.
  •  
    The International Olympic Committee failed to press China to allow fully unfettered access to the Internet for the thousands of journalists arriving here to cover the Olympics, despite promising repeatedly that the foreign news media could "report freely" during the Games, Olympic officials acknowledged Wednesday.
Anne Bubnic

Counteracting Cyberbullying Inside/Outside of School Grounds - 0 views

  • The problem is that most incidents of cyberbullying occur off-campus because students have more unsupervised time. But the impact is at school where students are physically together. Although there is no data on the extent of harmful impact, anecdotally, it is clear that some incidents lead to students avoiding or even failing school, committing suicide and even becoming violent.
  • Studies on cyberbullying reported in the December 2007 issue of Journal of Adolescent Health reveal that both perpetrators and targets of cyberbullying report significant psychosocial concerns and increased rates of involvement in offline physical and relational aggression
  • One study reported that the victims of cyberbullying were eight times more likely than other students to report bringing a weapon to school. The concerns for student safety are very real. Students who do not believe school officials can help them may seek their own revenge or refuse to come to school.
  •  
    Do school officials have the authority to impose discipline in response to harmful off-campus online speech? Should they? This is a major challenge facing school administrators today. Many state legislatures are now adding statutory provisions requiring schools to incorporate cyberbullying into bullying prevention policies. But this has presented some concerns. For example, in Oregon and Washington, language incorporated into cyberbullying legislation appears to restrict administrators from responding to any off-campus bullying regardless of the harmful impact on campus. Administrators from these two states are advised to check with their legal council. Administrators in other states should understand that the American Civil Liberties Union is trying to use language in the cyberbullying statutes to override federal case law and restrict administrators from doing anything in response to off-campus harmful speech.
Anne Bubnic

Blocking the Future [AASA] - 1 views

  • In this environment, school district leaders have a critical choice to make: Will their schools pro-actively model and teach the safe and appropriate use of these digital tools or will they reactively block them out and leave students and families to fend for themselves?
  • o better way to highlight organizational unimportance than to block out the tools that are transforming the rest of society.
  • the specific policies are much less important than the general mindset of the school district.
  • ...4 more annotations...
  • If a district has decided to figure out ways to facilitate technology usage and empower students and staff, the policies will follow accordingly. Conversely, if a district is determined to treat technology from a fearful or wary standpoint, its policies will reflect that position as well.
  • they do have to exercise appropriate oversight and convey the message, repeatedly and often, that frequent, appropriate technology usage is both important and expected.
  • they have the right mindset. Their first reaction is not “keep this out” but rather “how we can make this work?” We can learn from these organizations how they have balanced safety concerns with the need to empower students with 21st century skills and dispositions.
  • lease don’t relegate your students, particularly those from disadvantaged backgrounds, to second-class status in the new economy because you left it to them and their families to figure out on their own what it means to be digital, global citizens.
  •  
    [May 2008] AASA article gives examples of school organizations that are desperately and inappropriately blocking the future and Scott McLeod pleads, "Please don't block the future." Please don't relegate your students, particularly those from disadvantaged backgrounds, to second-class status in the new economy because you left it to them and their families to figure out on their own what it means to be digital, global citizens. Ask AASA and its state affiliates to provide more technology leadership-related professional development opportunities. And let us know how we can help.
Anne Bubnic

Letters To A Bullied Girl: Messages of Healing & Hope [New Book] - 0 views

  • Olivia Gardner, a teenager from Northern California, had been severely bullied in school. After reading of her ordeal in a local newspaper, we were shocked. Olivia had endured so much pain. Her book bag had been dragged through the mud, her schoolmates had created an "Olivia's Haters" page on the internet, and they would whisper "Die Olivia" to her in the halls. Olivia's story broke our hearts, especially when we learned that she was suicidal. We couldn't imagine such cruelty.
  • livia's story moved us, and a spark ignited between us - we both recognized that there was something that had to be done about this situation. We knew we couldn't be bystanders. We organized a letter-writing campaign and asked our friends to write letters of encouragement to Olivia. These messages of healing and hope were the least we could send to Olivia to let her know that she was not alone and that we were thinking about her and hoping she would get better.
  • Heartfelt, honest and powerful letters started pouring in. And then came the media requests. The more attention the "Olivia's Letters" project got, the more letters we received. Suddenly, we were thrust into the world of bullying, as we read the letters sent to Olivia by former bullies and targets of these bullies. We learned of the remorse adults felt having been bullies themselves in their teen years, and of the depression the targets of bullies still experience years after they have been bullied. Thousands of letters from all over the country and even the world flooded into Olivia's mailbox, each offering a unique perspective on courage and compassion.
  • ...2 more annotations...
  • We could never have predicted what a great and widespread response our little project to help one girl would receive. In a matter of a few weeks we became activists. Today, as the authors of the book Letters to a Bullied Girl: Messages of Healing and Hope, a compilation of some of the most revealing letters sent to Olivia, we are hopeful that the letter-writers' message to end the vicious cycle of bullying will continue to spread
  • As the letters in this book prove, bullying has serious consequences. We can no longer turn away or sit idly by as our peers are bullied so severely and relentlessly that they are forced to withdraw, isolate themselves and even turn to suicide. Our book is dedicated to Corinne Sides, who committed suicide as a result of bullying, and there are pages of letters from others who attempted suicide to escape their bullies.
  •  
    As teens across the country head back to school this year, far too many of them are facing the entrance doors to their schools with feelings of fear, trepidation and dread. For an increasing number of students across the nation, schooldays are filled with the never-ending cycle of taunting and abuse from their bullies. But this year, in an unprecedented display of solidarity, thousands of strangers who have been through the same harrowing experiences, are sharing their private tales of torment with these teens for the first time ever because of the story of Olivia Gardner.
scrollmantra

Prediction for Social Media Marketing Trends in 2018 - Scroll Mantra - 0 views

  •  
    When we talk about reaching the target audience on Social Media channels, we need to create a check list of things to keep in mind. For example, effectively creating content around your brand, choosing the right audience etc. are important aspects to keep in mind. When we add posts to a page that already has audience engagement, it encourages the audience to explore the brand's products and services.. At the same time, we use Social Media Marketing tools to track and tap the performance of posts and to optimize them further. With only a few days left to 2018, brands need to start planning for the coming year and need to create their Social Media Marketing Strategy according to the predicted trends.
wasifali

Ironing Board for small space - 0 views

image

Ironing Board

started by wasifali on 18 Jun 23 no follow-up yet
wasifali

Ironing Board for small space - 0 views

image

Ironing Board

started by wasifali on 18 Jun 23 no follow-up yet
Anne Bubnic

Cyberbullying The Real Threat on the Digital Playground - 0 views

  • "Parents are the key to this whole issue," explains Leasure. "They need to be involved and monitoring the computer and Internet activity of their kids. If they see something that isn't right, they need to act as parents and correct the issue."
  • parental awareness is truly the key to fixing this problem. If your child is the victim - or worse, the bully - it's time to step in. it's not being over-protective; it's trying to stop the current generation from 'virtually' destroying themselves emotionally
  • Cyberbullying Statistics: A recent survey of 395 students, ages 11 to 19, was conducted by the Kids/Teen Division of the Maine-based online safety organization Working To Halt Online Abuse. The study found that: � 28% of students have been cyberbullied, but... � Just over half tell their parents or another adult about it; of the students who did not report the cyberbullying, 25% felt it wasn't a big problem or didn't want to make a big deal out of it � 65% reported the cyberbullying was via IM, followed by email, MySpace, chat rooms and online games � 43% were cyberbullied by someone their age or in the same grade � 30% blocked or deleted the cyberbully, while 16% ignored them � 54 students admitted they had bullied somebody online themselves
  •  
    While reports and stories in the media focusing on Internet predators have become all too frequent, the closer-to-home threat to our children may really be cyberbullying, also known as electronic or online bullying. A recent survey of 395 students (11 to 19 years old) found that 28% of students have been cyberbullied, and more than 1 in 7 admitted to acting as the bully."Cyberbullying could be the biggest online threat facing teens today," says James Leasure, co-founder of Pandora Corp. "Of course Internet predators do still exist, but statistically, kids have a much greater chance of being involved in some way with electronic bullying." Most cases of cyberbullying go undocumented because, fortunately, many kids are able to shrug off the 'unkind words' and look the other way. But there are some cases that make national headlines when they turn into tragedies, such as the Megan Meier case in 2006. Larger cases like this have prompted several states to adopt legislation that makes online bullying illegal.
1 - 20 of 2208 Next › Last »
Showing 20 items per page