Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged Use

Rss Feed Group items tagged

Rhondda Powling

How do I know if my use is Fair Use? - 1 views

  •  
    Student worksheet for reasoning whether their use of media falls under fair use guidelines. Developed by the team at Temple University and based on the Code of Best Practices in Fair Use for Media Literacy.
adrinawinslet

How Hashtags Can Help You Improve Your Small Business Marketing - 0 views

  •  
    Hashtags can boost impressions, improve the search ability of your content, and encourage more people to talk about your brand. But using hashtags effectively, especially for business marketing, means doing more than just plugging them into your tweets on Twitter or posts on Instagram, Facebook or another social network. Here's what you need to know to use Hashtag Marketing better as part of your overall small business marketing strategy. - Trending Hashtags - Niche Hashtags - Branded Hashtags - Product or Service-Specific Hashtags - Call-to-Action Hashtag Ultimately, there is no one "right" type of hashtag to use to boost your social media posts. Instead, you'll be best served by using a wide range of hashtag types that are relevant to your business and your audience.
adrinawinslet

How to Use Hashtags on Twitter, Facebook and Instagram - 0 views

  •  
    Hashtags were first introduced on Internet Relay Chats (IRC's were live chats and messaging - kind of a precursor to the social sites we use today). They became popular on Twitter, where they were initially used for "tweet chats". Tweet chats are like open group discussions around a particular topic. The essence of the "tweet chat" is still relevant in how marketers can use hashtags today. 3 Key Marketing Strategies for Hashtags - Brand and campaign specific - Trending Hashtags - Content Hashtags Businesses follow many ways to implement hashtags on social media. Social media hashtags deserve more attention from marketers. To increase their reach among an increasingly global market, more brands use social media analytics tools to change their Hashtag Marketing.
Anne Bubnic

Back to School Tips| Americans for Technology Leadership - 0 views

  • Cyberbullying Cyberbullying or online bullying is repeated, unwanted or cruel behavior against someone through computers, cell phones, gaming consoles, or other Internet-based means. The Internet is always “on,” opening the door for 24-hour harassment. Cyberbullies can be anonymous. They never have to confront their victims, they don’t have to be physically stronger and cyberbullies may be virtually invisible to parents and adults.
  • Look for warning signs your child may be the victim of cyberbullying – depression, lack of interest in school and friends, drop in grades and subtle comments that something may be wrong. If your child is the victim of cyberbullying, take action. By filtering email, instant messages and text messages, you can cut off many of the ways the cyberbullies contact your child. By having your child avoid the sites and groups where the attacks occur, he/she can ignore the bully. If harassment continues, change your child’s email address, user names and Internet account. If these steps do not stop the cyberbullying, contact the parents of the child who is behind the bullying, contact the school, and if the situation is not resolved, involve the police. It’s important to compile copies of harassing emails and postings to have evidence for authorities or the school, so they can take action. Look for signs that your child may be the cyberbully themselves – if they sign onto the Internet under someone else’s name, if they use someone else’s password without their permission, if they posted rude or mean things about someone else online, if they use bad language online, or if they changed their profile or away message designed to embarrass or frighten someone. Talk to your kids about cyberbullying and why it’s wrong and hurtful.
  •  
    As children go back to school, many parents are concerned about how their children will be using the computer and Internet devices in the classroom. Communication is key. Parents need to talk with their children about how to use the Internet safely, potential threats and appropriate usage of the Internet. By understanding both the benefits and the risks of Internet use, families can have a safer and more secure online experience. This article includes key tips on cyberbullying, internet safety, privacy and security.
Anne Bubnic

Should schools teach Facebook? - 0 views

  •  
    FACEBOOK, MySpace, YouTube and Wikipedia are considered valuable educational tools by some who embrace the learning potential of the internet; they are also seen as a massive distraction with no academic benefit by others. Research in Nottingham and Notts suggests split opinions over the internet in the classroom. Some 1,500 interviews with teachers, parents and students nationwide showed the 'net was an integral part of children's personal lives, with 57% of 13 to 18-year-olds in Notts using blogs in their spare time and 58% in Nottingham. More than 60% of Nottingham teens use social networking sites. They are a big feature of leisure time - but now the science version of You Tube, developed by academics at The University of Nottingham, has been honoured in the US this week. The showcase of science videos shares the work of engineers and students online. However just a quarter of teachers use social networking tools in the classroom and their teaching, preferring to leave children to investigate outside school.
Anne Bubnic

California's 'digital divide' persists - [Survey Report] - 0 views

  • Slightly less than half of Latinos surveyed have home computers, compared to rates of 79 percent and above among black, Asian and white Californians, the survey found. While computer usage by blacks and whites in California has increased, there's been a decline in computer usage by Latinos and Asians, though Asian use remains much higher than that of Latinos. The drop appears to be correlated with income, with a sharp divide in computer usage between those making less than $40,000 and those making more.
  • Only 48 percent of Latinos have home computers compared with 86 percent of whites, 84 percent of Asians and 79 percent of blacks Californians, the institute reported.
  • But Asians and Latinos have seen declines in use of computers. Latinos' computer use has declined from 64 percent to 58 percent since 2000, while Internet use remained unchanged. Asians' use of computers was much higher, but also declined from 91 percent to 81 percent; Internet use went from 84 percent to 80 percent. Only 48 percent of Latinos have home computers compared with 86 percent of whites, 84 percent of Asians and 79 percent of blacks Californians, the institute reported.
  •  
    The use of computers and the Internet by Latinos and low-income Californians continues to lag behind other groups, according to a survey released Thursday by the Public Policy Institute of California.
Vicki Davis

Identity Theft Leads to Child-Porn Arrest Nightmare - 0 views

  • Simon Bunce of Hampshire, England, not only had his credit-card number stolen online but was arrested and falsely accused of being a pedophile when that card number was used to buy child pornography.
  • Yet that only came after he'd lost his $250,000-a-year job, his father and siblings stopped talking to him and his computer was taken away for several months, the BBC reports. Bunce had the misfortune of being caught up in Operation Ore, a massive British online kiddie-porn crackdown in 2003 that itself grew out of Operation Avalanche, an earlier American bust which began with a 1999 raid on Landslide Productions, a Texas mom-and-pop operation that handled credit-card transactions for porn Web sites.
  • about 7,200 people — whose card numbers showed up on the list.
  • ...2 more annotations...
  • Bunce was arrested "on suspicion of possessing indecent images of children, downloading indecent images of children and incitement to distribute indecent images of children" — all before a single image of such had been found on his computers at home and at work. He quickly found himself unemployed and estranged from his family. But his wife stuck by him, and while his computer sat in police custody waiting to be examined, Bunce took action.
  • Bunce used the U.S. Freedom of Information Act and a catalog of Internet Protocol addresses to establish that his credit-card number had been used in Jakarta, Indonesia, to buy child pornography online at the same moment he used the card to pay the bill at a London restaurant.
  •  
    Learning how to safely use e-commerce websites is important, but also, people need to be aware to protect their credit card numbers and identities as can be seen in this horrific case study. When websites are not safe about their use of credit card numbers, it can have horrible impacts such as this man losing his $250,000 a year job and becoming estranged from his family, when they thought he bought child pornography.
Anne Bubnic

Developing an Acceptable Use Policy - 0 views

  •  
    This site is intended to assist K-12 school districts and other K-12 entities in developing their own Acceptable Use Policy for use of the K-20 Network. Since "local control" is a major tenet of K-12 education in Washington state, it is up to each district to determine what elements they wish to include in their own policy, and if they wish to include other elements not contained in the template that has been provided. Includes sample parent letters and permission forms, guidelines for Internet Safety Policies and sample board policies on Network use.
Anne Bubnic

MedievalSpace.com - 0 views

  •  
    Class Blog used to support reading Richard III. Social networking used to demonstrate understanding of content. This same site used to have the Richard III theme used as a MYSPACE page, with students taking on the roles of characters within his circle of influence. Check out all of the student comments for each blog entry!
Anne Bubnic

Copyright & Fair Use in Documentary Film - 0 views

  •  
    From the Center for Social Media, School of Communication at American University. This document is a code of best practices that helps creators, online providers, copyright holders, and others interested in the making of online video interpret the copyright doctrine of fair use. Fair use is the right to use copyrighted material without permission or payment under some circumstances
Anne Bubnic

How to Protect Kids' Privacy Online: A Guide for Teachers - 1 views

  •  
    Many school districts are adopting Acceptable Use Policies (AUPs) to educate parents and students about Internet use and issues of online privacy and safety, and seek parental consent for their children's use of the Internet. For example, an AUP may tell parents about the privacy policies of online services with which a school has contracts and students' use of non-contract websites. It may include cautions against children disclosing personal information to websites - such as their full name, home or email address, and telephone number. Or it may tell parents that the school has established classroom email accounts rather than individual accounts if email communication is necessary between students and online services.
Anne Bubnic

Fair Use for Media Literacy Education [Video] - 0 views

  •  
    Do you suffer from Copyright Confusion? This is another great video from the Center for Social Media that describes the new Code of Best Practices in Fair Use for Media Literacy. This is a great video to show at an educator workshop as a segue into the new thinking on Copyright Law and Fair Use. The Fair Use document was developed and funded by a MacArthur Foundation grant after a research study revealed that rigid interpretations of copyright law are actually strangling educational practice rather than enabling it.
Anne Bubnic

Fair use and transformativeness: It may shake your world - 0 views

  •  
    Fair use is a doctrine within copyright law that allows use of copyrighted material for educational purposes without permission from the the owners or creators. It is designed to balance rights of users with the rights of owners by encouraging widespread and flexible use of cultural products for the purposes of education and the advancement of knowledge.
Judy Echeandia

Facebook, Cell Phones, & iPods: Updating The K-12 Student Handbook - 0 views

  •  
    Today's students live in an incredibly high tech world- from cell phones to Facebook to YouTube to iPods- K-12 schools are faced with a multitude of new challenges that must be addressed in your student handbook. How can you restructure your student handbook to include the potential issues that may arise as a result of students' increased use of these technologies? Join us for a live, 60-minute audio conference where you and your colleagues will learn:
    * Keys to Drafting K-12 Handbook Policies for Today's Students
    * Online Use Policies: Facebook, MySpace & Online Communities
    * Crafting Guidelines & Policies for Cell Phone & iPod Use at School
    * Protecting Your School from Liability: What You Need to Know
    * Cyberbullying & Technology Misconduct: What Educators Must Know
solospiders

Smart Keyboard For Ipad 7th Generation - 0 views

  •  
    Been using Smart Keyboard For Ipad 7th Generation for a week, will update the review with durability and longevity comments after more time has passed… Felt like nobody mentions some things that are worth knowing… There are magnets in places that make this thing more functional than they tell you. You can wrap the cover to the backside of the iPad and use it as you would normally, and magnets will hold it in place. When you use it as a stand, you can use it like a tilted drawing pad. Magnets will hold it in this position so it's actually fairly secure. If you're opening it or changing the configuration, magnets hold the keyboard in, so you can treat it exactly like a regular smart cover without the keyboard annoyingly flopping out. And finally, you don't have to worry about accidentally pressing keyboard buttons when it's in any position other than "laptop mode." The magnets let it know and the keyboard won't function unless it's specifically in this mode. Would have bought it sooner had I known, instead of just taking a chance.
Falcon Emergency

Getting Started with Chrome extension - Diigo help - 0 views

  • Use the “Save” option to bookmark a page. Bookmarking saves a link to the page in your online Diigo library, allowing you to easily access it later.
  • Highlighting can also be accomplished from the context pop-up. After the Chrome extension is installed, whenever you select text on a webpage, the context pop-up will appear, allowing you to accomplish text-related annotation. Highlight Pop-up Menu – After you highlight some text, position your mouse cursor over it and the highlight pop-up menu will appear. The highlight pop-up menu allows you to add notes to, share, or delete the highlight.
  • Sticky Note Click the middle icon on the annotation toolbar to add a sticky note to the page. With a sticky note, you can write your thoughts anywhere on a web page.
Anne Bubnic

Cyberbullying Policy: Harrass others and Lose Your Driver's License! - 0 views

  • In the past, the Medford district had used its umbrella policy on bullying, harassment and intimidation to crack down on cyber bullying.Spelling out the ban on cyber bullying and threatening to suspend driving privileges sends out a clear message that school officials are on the watch for such behavior, officials said.
  •  
    Medford School District takes Cyberbullying seriously. In a new update to their board policy, students who use text messages or e-mails to harass schoolmates could lose their driver's licenses. Apparently, this policy has also been used for chronic truancy offenses. Prior to this new update, the school board policy on cyberbullying was already one that strongly articulated zero-tolerance for bullying in cyberspace.
Anne Bubnic

Messaging Shakespeare | Classroom Examples | - 0 views

  • Brown's class was discussing some of the whaling calculations in Moby Dick. When one student asked a question involving a complex computation, three students quickly pulled out their cell phones and did the math. Brown was surprised to learn that most cell phones have a built-in calculator. She was even more surprised at how literate her students were with the many functions included in their phones. She took a quick poll and found that all her students either had a cell phone or easy access to one. In fact, students became genuinely engaged in a class discussion about phone features. This got Brown thinking about how she might incorporate this technology into learning activities.
  • Brown noticed that many students used text messaging to communicate, and considered how she might use cell phones in summarizing and analyzing text to help her students better understand Richard III. Effective summarizing is one of the most powerful skills students can cultivate. It provides students with tools for identifying the most important aspects of what they are learning, especially when teachers use a frame of reference (Marzano, Pickering, & Pollock, 2001). Summarizing helps students identify critical information. Research shows gains in reading comprehension when students learn how to incorporate isummary framesi (series of questions designed to highlight critical passages) as a tool for summarizing (Meyer & Freedle, 1984). When students use this strategy, they are better able to understand what they are reading, identify key information, and provide a summary that helps them retain the information (Armbruster, Anderson, & Ostertag, 1987).
  • Text messaging is a real-world example of summarizing—to communicate information in a few words the user must identify key ideas. Brown saw that she could use a technique students had already mastered, within the context of literature study.
  • ...2 more annotations...
  • To manage the learning project, Brown asked a tech-savvy colleague to help her build a simple weblog. Once it was set up, it took Brown and her students 10 minutes in the school's computer lab to learn how to post entries. The weblog was intentionally basic. The only entries were selected passages from text of Richard III and Brown's six narrative-framing questions. Her questions deliberately focused students' attention on key passages. If students could understand these passages well enough to summarize them, Brown knew that their comprehension of the play would increase.
  • Brown told students to use their phones or e-mail to send text messages to fellow group members of their responses to the first six questions of the narrative frame. Once this was completed, groups met to discuss the seventh question, regarding the resolution for each section of the text. Brown told them to post this group answer on the weblog.
  •  
    Summarizing complex texts using cell phones increases understanding.
Anne Bubnic

Digital Citizenship: Using Technology Appropriately - 0 views

  •  
    This web site was developed by Mike Ribble, co-author of Digital Citizenship in the Schools. He covers the 9 areas of Digital Citizenship that are outlined in the book and offers many examples of how educators can begin the process of teaching their students how to use technology more appropriately. These resources can be used by any anyone who is interested in helping students or others better understand appropriate technology use.
gailene nelson

Fair use explained for educators - 0 views

  •  
    To help everyone understand fair use, The Code of Best Practices in Fair Use for Media Literacy Education was released today by the Center for Social Media in the School of Communication at Temple University.
‹ Previous 21 - 40 of 966 Next › Last »
Showing 20 items per page