Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged US

Rss Feed Group items tagged

Anne Bubnic

Best Practice: School District Bookmarks on Delicious - 0 views

  •  
    Excellent demonstration of a school district using deli.cio.us for bookmarking of K-3 resources.
Anne Bubnic

The Millennials Are Coming! - 0 views

  • Most agencies manage sensitive citizen data: addresses, Social Security numbers, financial records and medical information. You name it, some state or local office has it, and probably electronically. The problem? Many theorize that the Millennials' penchant for online openness could unintentionally expose private information, leaving it ripe for the picking. Millennials bring innovative ideas about technology's use, but for that same reason, do they also pose new security risks?
  • Anti-virus vendor Symantec released a study in March 2008 assessing this issue. Symantec commissioned Applied Research-West to execute the study, and 600 participants were surveyed from different verticals, including government. Survey participants included 200 IT decision-makers, 200 Millennial workers and 200 non-Millennial workers born before 1980. The data revealed that Millennials are more likely than workers of other ages to use Web 2.0 applications on company time and equipment. Some interesting figures include: 69 percent of surveyed Millennials will use whatever application, device or technology they want at work, regardless of office IT policies; and only 45 percent of Millennials stick to company-issued devices or software, compared to 70 percent of non-Millennials.
  • How might young people be workplace assets? Could all that time typing or texting make them speedy typists, able to whip up memos at the drop of a hat? Does familiarity with new and emerging technologies have its benefit? You bet, according to Dustin Lanier, director of the Texas Council on Competitive Government. The council brings state leaders together to shape policy for government departments, including IT. "I think they've built an approach to work that involves a lot of multitasking," Lanier said of the Millennials. "Something will be loading on one screen, you alt-tab to another application and pull up an e-mail, the first process loads, you flip back, start a new process, flip to a forum and pull up a topic. It's frenetic but normal to that group." Lanier doesn't think Millennials present more of an IT threat than their older co-workers. After all, young people don't have a monopoly on being distracted in the office. "I can't tell you how many times I've walked by people's desks of all ages and seen Minesweeper up," he said. He thinks employers should embrace some Web 2.0 applications. Otherwise, Millennials might be discouraged from sticking around. According to Lanier, this younger work force comprises many people who think of themselves as free agents. Government should accommodate some of their habits in order to prevent them from quitting.
  •  
    Get ready CIOs. They're coming. They have gadgets and doohickeys galore. They like their music downloadable and portable, and they grew up with the Internet, not before it. Their idea of community is socializing with people in other cities or countries through Facebook, MySpace or instant messages, and they use e-mail so often they probably think snail mail is an endangered species. They're the Millennials - those tech-savvy, 20-somethings and-under bound to warm up scores of office chairs left cold by retiring baby boomers. There's a good chance many will come to a government workplace near you, but their digital literacy could prove worrisome for security-conscious bosses.
Anne Bubnic

Humiliation and gossip are weapons of the cyberbully - 0 views

  • ead teachers are being advised to draw up new rules on mobile phone use amid a growing number of cases of what is now known as “cyber-bullying”. In many secondary schools, over 90% of bullying cases are through text messages or internet chatrooms. It is hoped that the rules about mobile phone use will protect children from abusive texts, stop phones going off in class and prevent mobiles being taken into exam halls.
  • Although the majority of kids who are harassed online aren’t physically bothered in person, the cyber-bully still takes a heavy emotional toll on his or her victims. Kids who are targeted online are more likely to get a detention or be suspended, skip school and experience emotional distress, the medical journal reports. Teenagers who receive rude or nasty comments via text messages are six times more likely to say they feel unsafe at school.
  • The problem is that bullying is still perceived by many educators and parents as a problem that involves physical contact. Most enforcement efforts focus on bullying in school classrooms, corridors and toilets. But given that 80% of adolescents use mobile phones or computers, “social interactions have increasingly moved from personal contact at school to virtual contact in the chatroom,'’ write Kirk R. Williams and Nancy G. Guerra, co-authors of one of the journal reports. “Internet bullying has emerged as a new and growing form of social cruelty.'’
  • ...1 more annotation...
  • Cyber-bullying tactics include humiliation, destructive messages, gossip, slander and other “virtual taunts” communicated through e-mail, instant messaging, chatrooms and blogs. The problem, of course, is what to do about it. While most schools do not allow pupils to use their mobiles in the school building, an outright ban is deemed unworkable. Advances in technology are throwing up new problems for teachers to deal with. Children use their phones to listen to music, tell the time or as a calculator. Cyber-bullies sometimes disclose victims' personal data on websites or forums, or may even attempt to assume the identity of their victim for the purpose of publishing material in their name that defames them or exposes them to ridicule.
  •  
    As more and more people have access to computers and mobile phones, a new risk to youngsters has begun to emerge. Electronic aggression, in the form of threatening text messages and the spread of online rumours on social networking sites, is a growing concern.
Anne Bubnic

The Road to Cybersafety - 0 views

  • Carrill is part of the Platte County Sheriff’s Office. He also leads the Western Missouri Cyber Crimes Task Force. One of his primary missions is to track down and arrest online predators who trade in child pornography.And all these cameras only make his job more challenging. About 40 percent of the nation’s minors have access to Webcams, Carrill explained, devices for uploading live video to the Internet. About 65 percent of all children have access to cell phone cameras.
  • erhaps the biggest issue is that fact that kids don’t understand that when a picture is posted online, it’s nearly impossible to remove.“Once that image is taken, it’s out there forever,” Shehan said. “The No. 1 issue that we’ve seen with Webcams is teenagers self-producing pornography.”
  • All we can tell them is, ‘I’m sorry,’” Carrill said. “The minute the camera clicks, you no longer own that image. It has the potential to harm that person years from now.”A Webcam placed in a child’s bedroom is another bad combination, according to Shehan and Carrill. Sexual predators search for kids who use Webcams in the privacy of their own rooms, then lure or blackmail the child into providing pictures of themselves.“We see cases time after time of children who take pictures, send them to a predator and get a pornographic collage back that the predator uses to blackmail the child into providing more images,” Shehan said.
  • ...3 more annotations...
  • . About 40 percent of the nation’s minors have access to Webcams, Carrill explained, devices for uploading live video to the Internet. About 65 percent of all children have access to cell phone cameras.Carrill’s team recently started a new operation to search image-trading Web sites for known child pornography in Missouri. The results were frightening, he said. More than 6,000 images were found in the state; about 700 of those pictures were downloaded in the Kansas City area.Between sexual predators who fish for images and immature decisions by kids with cameras, more children are either having their images posted online or being exposed to pornography, according to a 2006 report by the National Center for Missing and Exploited Children.
  • In the end, the best tool to defeat child pornography is parent education, according to both Shehan and Carrill. More than anything, kids need to know they can trust their parents.“It’s through that open line of communication between the parent and child that they can work through or prevent bad situations,” Carrill said.
  • All parents should follow a few basic rules when it comes to cyber safety, according to experts:- Keep computers in common areas of the home.- Monitor Internet use by children.- Enable privacy protection software.- Turn Webcams off or protect them with a password.- Track what images are being uploaded by children in the household.- Talk to children about what is appropriate.
  •  
    Webcams, cell phone cameras being put to troubling use, experts say. People are taking pictures, lots of them, and then uploading them as permanent displays in the Internet collection.
Anne Bubnic

Copyright Issues When Using Music in Videos [pdf] - 0 views

  •  
    Make your students and staff aware of the potential infringements. Most teachers and students use music in their video and then publish or use in it in a public setting while thinking they've done nothing wrong. But, their lack of knowledge about the laws does not make them immune. \n
Anne Bubnic

University of Alabama and Hoover Schools Embrace Second Life - 0 views

  • Several local teachers and professors see Second Life as a tremendous opportunity. There are educational islands in Second Life where teachers can go to digitally swap ideas, conduct research or attend real life conferences.
  • However, a teacher can take students on a virtual field trip in Second Life - using his or her own login - to places like the Alamo or the Louvre Museum, both of which have been impressively recreated in Second Life.
  • The University of Alabama is using Second Life too. In fact, Professor Rick Houser, Chairman of Educational Studies at the Capstone, is working on building an entire virtual University of Alabama campus in Second Life.
  • ...2 more annotations...
  • But how healthy is it for kids, especially younger ones, to be spending time in a virtual world when there’s a real world they need to learn to navigate? What about on-line predators? Second Life does not verify the age a user enters.
  • These students are growing up as digital natives. They want to use this, they want to be engaged in these types of technologies and it’s important for us to facilitate that learning,” she says.  Brandt also wants to teach students the dangers they need to be aware of when using Second Life or any type of social networking website. She calls it “good digital citizenship”.
  •  
    This week, the Hoover Board of Education is holding a technology training seminar to help teachers get up to speed for the new school year. On the agenda - a powerful and somewhat controversial website called "Second Life".
Judy Echeandia

What Kids Learn from Social Networking | 21st Century Connections - 0 views

  • "What we found was that students using social networking sites are actually practicing the kinds of 21st century skills we want them to develop to be successful today," said Christine Greenhow, a learning technologies researcher in the university's College of Education and Human Development and principal investigator of the study.
  • "Students are developing a positive attitude towards using technology systems, editing and customizing content and thinking about online design and layout. They're also sharing creative original work like poetry and film and practicing safe and responsible use of information and technology. The
  • Web sites offer tremendous educational potential."
  •  
    University of Minnesota study uncovers the educational benefits of social networking sites. "What we found was that students using social networking sites are actually practicing the kinds of 21st century skills we want them to develop to be successful today," said Christine Greenhow, a learning technologies researcher in the university's College of Education and Human Development and principal investigator of the study.
Vicki Davis

Think.com - Safety and Netiquette Lesson - 0 views

  • Identify and provide examples of proper and improper netiquette; Generate a list of preferred web behaviors for their class; Understand and use a few Think.com content creation tools; Define "safety" and describe/draw an environment that values safety; Develop a greater sense of personal responsibility and web community; and Define the following words: accountable, community, enforcement, environment, etiquette, inappropriate, law, netiquette, private, responsible, rule, safety.
  •  
    Think.com's safety lesson with nets standards. Think.com is excellent to use with younger students and is very walled and has an excellent profanity filter. I highly recommend it and have personally used it for a summer blogging project. Excellent site. It also requires an extensive verification process by the participating schools.
  •  
    Excellent lesson plan and activities from think.com for teaching digital citizenship, particularly safety and netiquette.
Anne Bubnic

How We Use Twitter for Journalism - ReadWriteWeb - 0 views

  •  
    How useful can communication limited to 140 characters be for serious journalism? It turns out that the short messages you find on Twitter have proven wildly useful for some writers penning larger pieces.

    Could there be some classroom applications here?

Anne Bubnic

Fair-Use Help For Internet On Its Way - 0 views

  •  
    "The Code of Best Practices in Fair Use for Media Literacy Education," set for release this week, provides a framework for using copyright materials in classroom activities and student projects and lays out what applications are restricted or permitted by law.
Judy Echeandia

Copyright Code Developed to Guide Teachers [November 10, 2008] - 0 views

  • Many educators, however, miss these opportunities because they don't know their rights under fair use, have been given bad information or lack administrators who will back them up, said a report last year by American and Temple universities. The report, "The Cost of Copyright Confusion for Media Literacy," found that many teachers were censoring themselves.
  •  
    The code doesn't cover every possible situation -- nor does it say educators have unfettered use -- but it's aimed at providing clearer guidelines to help teachers and students understand when they can use material without seeking permission or making a payment.
Anne Bubnic

Fair-use guide offers copyright protection for educators - 0 views

  •  
    Hoping to clear up the confusion over the "fair use" of digital materials in teaching and learning, a panel of university professors has developed a "Code of Best Practices in Fair Use for Media Literacy Education."
Anne Bubnic

ReadWriteThink: Audience, Purpose, and Language Use in EMail - 0 views

  •  
    With the increasing popularity of e-mail and online instant messaging among today�s teens, a recognizable change has occurred in the language that students use in their writing. This lesson explores the language of electronic messages and how it affects other writing. Furthermore, it explores the freedom and creativity for using Internet abbreviations for specific purposes and examines the importance of a more formal style of writing based on audience.
Anne Bubnic

Permission Forms | Acceptable Use Policy - 0 views

  •  
    The Acceptable Use Policy should state that written parental consent is required before any student is given access to the Internet or to electronic mail. There needs to be a signature form for parents and students to sign indicating that they have read, understand and intend to abide by the school's Acceptable Use Policy. Sample permission forms are included for elementary, middle and high school.
Anne Bubnic

Educational Uses of Second Life - 0 views

  •  
    This is an overview of some of ways Second Life can be used, and in some cases, has been used for educational purposes. See Further Resources at the bottom of this page for links to more examples and other resources.
Anne Bubnic

A Web 2.0 Approach To Cybersafety [Nancy Willard] - 0 views

  •  
    An effective school-based strategy to address the issue of online safety should include these six key components:
    EDUCATIONAL USE - Schools must ensure that when students use the Internet, their activities have an educational purpose -- class assignments, extra credit work, and perhaps some high quality enrichment activities as a reward
    SUPERVISION AND MONITORING Schools must shift focus from reliance on filtering to better supervision and monitoring.
    MEANINGFUL CONSEQUENCES Misuse of the Internet must lead to a meaningful consequence -- but it should be recognized that suspension of Internet access privileges just causes more work for teachers. Requiring a service contribution to the school and establishing "close monitoring status" for all Internet use are preferable consequences.
    ACCIDENTAL ACCESS TO PORN - All students and staff must know that if inappropriate material appears, they should quickly turn off the monitor or turn it so it can't be seen, and then report it. Following any incident or discovery, there must be a responsible assessment of culpability.
    INAPPROPRIATE BLOCKING Selected staff in every school building must have the authority and ability to quickly override the filter to provide other staff or students access to sites that have been inappropriately blocked
    INTERNET SAFETY AND RESPONSIBLE USE EDUCATION Schools must provide effective Web 2.0 Internet safety and responsible use education to students and parents.

Anne Bubnic

Fair Use Guidelines for Educational Multimedia Projects - 0 views

  •  
    These guidelines were developed during the Conference on Fair Use. Educators and students are advised to exercise caution in using digital material downloaded from the Internet in producing their own educational multimedia projects, because there is a mix of works protected by copyright and works in the public domain on the network. Access to works on the Internet does not automatically mean that these can be reproduced and reused without permission or royalty payment and, furthermore, some copyrighted works may have been posted to the Internet without authorization of the copyright holder.\n
Anne Bubnic

Ensuring Equitable Use of Education Technology - 1 views

  •  
    When a school or district decides to implement education technology into the curriculum, one of its overriding goals must be to create plans and policies for all members of the learning community to have equitable access and use. Appropriate funding and professional development represent the key means of supporting equitable access and use of technology to ensure technology literacy and to support meaningful learning for all students.
Anne Bubnic

Using Google SMS to Enrich Social Studies Instruction - 1 views

  •  
    This lesson can be implemented at school if you are teaching in an environment that allows students to use personal learning devices, or outside of school if students are banned from using digital devices.
Anne Bubnic

Implications for teachers who socialize with students online - 1 views

  • Always exercise extreme care when communicating online with students and if at all possible, avoid socializing. These measures, along with district policy that preempts the possibility of inappropriate relationships developing online between staff and students, seems the best way to go.
  •  
    Significant concerns raised about student-teacher intractions in a social media environment, including the issue that students flirt. Relatedly, anything performed online by a public school employee - including information and images posted on social networking sites - will be used to judge the character of that individual. There is also the concern that the friends of the staff member may post unflattering information or tag inappropriate images of them which will quickly be used to prompt one major question: "Is this the kind of person we trust to be responsible for our children?"
« First ‹ Previous 81 - 100 of 1066 Next › Last »
Showing 20 items per page