Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged Use

Rss Feed Group items tagged

Anne Bubnic

Messaging Shakespeare | Classroom Examples | - 0 views

  • Brown's class was discussing some of the whaling calculations in Moby Dick. When one student asked a question involving a complex computation, three students quickly pulled out their cell phones and did the math. Brown was surprised to learn that most cell phones have a built-in calculator. She was even more surprised at how literate her students were with the many functions included in their phones. She took a quick poll and found that all her students either had a cell phone or easy access to one. In fact, students became genuinely engaged in a class discussion about phone features. This got Brown thinking about how she might incorporate this technology into learning activities.
  • Brown noticed that many students used text messaging to communicate, and considered how she might use cell phones in summarizing and analyzing text to help her students better understand Richard III. Effective summarizing is one of the most powerful skills students can cultivate. It provides students with tools for identifying the most important aspects of what they are learning, especially when teachers use a frame of reference (Marzano, Pickering, & Pollock, 2001). Summarizing helps students identify critical information. Research shows gains in reading comprehension when students learn how to incorporate isummary framesi (series of questions designed to highlight critical passages) as a tool for summarizing (Meyer & Freedle, 1984). When students use this strategy, they are better able to understand what they are reading, identify key information, and provide a summary that helps them retain the information (Armbruster, Anderson, & Ostertag, 1987).
  • Text messaging is a real-world example of summarizing—to communicate information in a few words the user must identify key ideas. Brown saw that she could use a technique students had already mastered, within the context of literature study.
  • ...2 more annotations...
  • To manage the learning project, Brown asked a tech-savvy colleague to help her build a simple weblog. Once it was set up, it took Brown and her students 10 minutes in the school's computer lab to learn how to post entries. The weblog was intentionally basic. The only entries were selected passages from text of Richard III and Brown's six narrative-framing questions. Her questions deliberately focused students' attention on key passages. If students could understand these passages well enough to summarize them, Brown knew that their comprehension of the play would increase.
  • Brown told students to use their phones or e-mail to send text messages to fellow group members of their responses to the first six questions of the narrative frame. Once this was completed, groups met to discuss the seventh question, regarding the resolution for each section of the text. Brown told them to post this group answer on the weblog.
  •  
    Summarizing complex texts using cell phones increases understanding.
Anne Bubnic

Digital Citizenship: Using Technology Appropriately - 0 views

  •  
    This web site was developed by Mike Ribble, co-author of Digital Citizenship in the Schools. He covers the 9 areas of Digital Citizenship that are outlined in the book and offers many examples of how educators can begin the process of teaching their students how to use technology more appropriately. These resources can be used by any anyone who is interested in helping students or others better understand appropriate technology use.
gailene nelson

Fair use explained for educators - 0 views

  •  
    To help everyone understand fair use, The Code of Best Practices in Fair Use for Media Literacy Education was released today by the Center for Social Media in the School of Communication at Temple University.
Anne Bubnic

Smart AUP Quiz - Assessment tool for student understanding of AUP - 4 views

  •  
    A school's Acceptable Use Policy, or AUP, is a list of technology regulations that require students to use technology responsibly and prevent abuse of school computers. Students are often required to sign this "user contract" in order to use school network computers but unfortunately many sign without reading or understanding the information. The Smart AUP assessment tool is a fun and effective way for students to demonstrate to teachers and administrators that they have read and understand the AUP.
Anne Bubnic

Cybersafety Week Curriculum Materials - Santa Ana School District - 1 views

  •  
    Santa Ana School District has posted their cybersafety materials online in fulfillment of requirements for AB 307. Materials were used district wide (Feb 23-27) in all grade levels. The same materials were also used in the Newport Mesa Unified School District for CyberSmart Week.
adrinawinslet

Top 10 Effective Ways of Using Hashtags in Social Media Marketing - 0 views

  •  
    Hashtags Are An Integral Part Of Any Hashtag in Social Media Marketing Strategy. It Is A Great Way Of Labeling And Finding Social Media Updates. When Comes To Promoting Your Brands On Social Media, Hashtags Are Fundamental To Attaining Success. ● Using The Equal Hashtags Across Social Media Structures Has Some Obvious Benefits. Hashtag Based On Social Media Platform ● Now It's Time To Spoil Down Precisely How You Can Use Hashtags Effectively On The Largest Social Networks. ○ Those Networks Are: ■ Twitter Hashtags ■ Instagram Hashtags ■ Facebook Hashtags ● It Is Genuinely Very A Lot Worrying To Read A Post Having Too Many Hashtags. Again It Relies Upon On The Social Media Platform You Are Using. Number Of Hashtags In A Post.
adrinawinslet

Helpful Tips and Examples for a Making Contact Us Page - 0 views

  •  
    While many sites throw up a contact us page as a quick after-thought, you should be dedicating a lot more time and care to your contact page because, for many brands, it's the beginning of your relationship with potential customers. Today we're providing some contact us page best practices and looking at examples of incredible contact us pages that show various styles based on different business audiences and intent. For More Information Visit: http://bit.ly/2lJ8oZu
adjustingto6figu

Why You Should Use Social Media as an Independent Adjuster - 0 views

  •  
    Social media has opened up the world of networking and influencing for independent adjusters. It is now easier to find like-minded people, as well as clients, once you start engaging and using social media on a regular basis. The three biggest sites to think about using are Facebook, LinkedIn, and Quora - which we will go over in this article so you can understand how to use them for your benefit as an independent adjuster.
realcounterfeits

Cloned Credit cards for sale - Real Counterfeits Money - 0 views

  •  
    Cloned Credit cards for sale Cloned Cards Buy These cards are associated with a bank account and can be used for 30 days from the first use (so it's important to use all the money during this time). These cards are recommended for withdrawing money from ATMs only and of course they come with their PIN CODE Prepaid Cards VISA These cards are not associated with a bank account or person and are therefore considered the safest cards to use. These cards costs are a little more expensive than cloned cards because we've already clearing a clone card and transferring money to a prepaid card. With this card you can enjoy all the possibilities of use (shopping in stores and withdrawals) along with peace of mind. Prepaid Cards MasterCard These cards are not associated with a bank account or person and are therefore considered the safest cards to use. These cards costs are a little more expensive than cloned cards because we've already clearing a clone card and transferring money to a prepaid card. With this card you can enjoy all the possibilities of use (shopping in stores and withdrawals) along with peace of mind. Buy Cloned Credit cards for sale online
seosmmseller458

Buy Verified Payoneer Account - 0 views

  •  
    What Is Verified Payoneer Accounts? Verified payoneer accounts are the most trusted way to transfer money online. If you want to receive money from any part of the world, then verified payoneer accounts are what you need. It is used by many people across the globe and they have been using it for years now.
  •  
    If you are looking to increase your online sales by accepting payments, then you should consider buying verified payoneer accounts. These accounts can be used for receiving payments from customers when they make purchases from your website. There are many benefits to having a verified account, including the ability to use it in different currencies, and being able to receive funds for up to two months after using the account for an online purchase.
  •  
    Verified payoneer accounts are the most trusted way to transfer money online. If you want to receive money from any part of the world, then verified payoneer accounts are what you need. It is used by many people across the globe and they have been using it for years now.
Anne Bubnic

AB 307 [Chavez Bill ]- California - 0 views

  •  
    AB 307 charges districts to "educate pupils and teachers on the appropriate and ethical use of information technology in the classroom, Internet safety, avoiding plagiarism, the concept, purpose, and significance of a copyright so that pupils can distinguish between lawful and unlawful online downloading, and the implications of illegal peer-to-peer network file sharing."

    This bill shows up as additional items in the planning criteria found in the EETT grant applicationCalifornia Education Code Section 51871.5, -- legislation, monitoring student internet use, ethical use of educational technology in the classroom, information literacy, aspects of information literacy/Internet safety, cyber-bullying, research studies and reports.
Anne Bubnic

Peer-to-peer Networks for Exchanging Child Pornography Busted - 0 views

  • All of the defendants are charged with possession of child pornography, and some are charged with additional offenses, such as production of child pornography and committing crimes while registered as sex offenders. Those charged include a law enforcement officer, attorneys and men with previous convictions related to the child pornography.
  • These cases are the result of a coordinated investigation in which law enforcement used sophisticated software to track down computers on which child pornography was being stored and made available to others via peer-to-peer networks. Peer-to-peer networks are an increasingly popular method for sharing files on the Internet. Using software programs such as Limewire, computer users can join networks that allow the sharing of files across the Internet, often for no charge.
  • Robert Schoch, special agent in charge for the ICE office of investigations in Los Angeles, stated: “Today, those involved in child exploitation - like everyone else - are using the remarkable reach of the Internet, and peer-to-peer technology is the latest frontier. But we have a message for child sex predators who think they can escape justice by hiding in Cyberspace. We will do everything in our power and use every tool at our disposal to keep our children safe - whether they are around the block or around the world.”
  •  
    Federal and local authorities arrested seven men for possession of child pornography today as part of an ongoing multi-agency investigation spearheaded by U.S. Immigration and Customs Enforcement (ICE) and the FBI that has resulted so far in the filing of charges against 55 defendants who allegedly used peer-to-peer networks to exchange sexually graphic images of children.
Anne Bubnic

Protecting Children from Adult Content on Wireless Devices - 0 views

  • What You Can Do If you are concerned about your children accessing adult material from their wireless phones/devices, consider the following: Monitor how your children are using their wireless phones or other wireless devices. For example, are they using them mainly for talking, or are they using them for messaging, taking photos and downloading applications? Check with your carrier to see what types of material it offers and what types can be accessed from your children’s handsets. Check with your carrier to see if there are ways to prevent access to and downloading of content that may contain inappropriate material and that is available on a per-use or per-application basis (e.g., games, wall paper images, songs). Monitor your bill. Any content purchases made from a wireless phone should appear on your monthly bill, so check your bill to see if any purchases have been made from your children’s phones/devices. The FCC requires that the descriptions of charges on wireless carrier bills be full, clear, non-deceptive, and in plain language. Check with your carrier to see what handsets are available for your children that are not capable of accessing advanced applications that may contain adult material. Check with your carrier to see whether subscriptions to wireless data or wireless Internet packages also offer access to adult material on your children’s phone.
  •  
    With the benefits of wireless technology comes a potential harm: the growing use of wireless phones and devices by children affords them the opportunity to access adult material that may be inappropriate for them. The FCC offers 6 tips for wireless safety.
Vicki Davis

Susan Silverman's Lucky Ladybugs project going on for elementary - 0 views

  • A Collaborative Internet Project for K-5 Students
  • Essential Question: Why are ladybugs considered to be good luck?
  • This project will demonstrate lesson plans designed following principles of Universal Design for Learning (UDL) and examples of student work resulting from the lessons.  As teachers we should ask ourselves if there are any barriers to our students’ learning.  We should look for ways to present information and assess learning in non-text-based formats. 
  • ...5 more annotations...
  • Based on brain research and new media, the UDL framework proposes that educators design lessons with three basic kinds of flexibility: 1. Multiple formats and media are used to present information.
  • Examples: Illustrations, pictures, diagrams, video or audio clips, and descriptions 2.   Teachers use multiple strategies to engage and motivate students. 3.   Students demonstrate learning through multiple performance and product formats.
  • UDL calls for three goals to consider in designing lessons: 1.  Recognition goals: these focus on specific content that ask a student to identify who, what, where, and when. 2.  Strategic goals: these focus on a specific process or medium that asks a student to learn how to do something using problem solving and critical think skills. 3. Affective goals: these focus on a particular value or emotional outcome. Do students enjoy, and appreciate learning about the topic? Does it connect to prior knowledge and experience? Are students allowed to select and discover new knowledge?
  • Resources you might want to use: Scholastic Keys, Kid Pix, Inspiration and Kidspiration, digital camera (still and video), recording narration/music, United Streaming.  Let your imagination go!
  • This project begins on March 15, 2007.  Materials need to be e-mailed by May 31, 2008.
  •  
    An excellent project for elementary students to connect with other classes.
  •  
    A great way to get started with technology is to join in an exciting project. this project by Susan Silverman was designed using the principles of Universal Design for Learning. I've heard her present and she is a pro. (Along with my friend Jennifer Wagner.)
Sheryl A. McCoy

What Are We Protecting Them From? - 0 views

  •  
    a very powerful article about the need to improve how filitering occurs at schools or other public facilities like libraries; ignorance among people like the late Justice Rehnquist and other US Supreme Court justices is disconcerting; it appears that the 19th century education practices in the training and professional development of our doctors, lawyers and chiefs in service to us through our government exacerbate the modern day problems with technology use and an open society.
Anne Bubnic

Troubled teens spread despair in cyberspace - 0 views

  •  
    People used to say a child's suicide ripples through a community. These days, it rides an electronic wave. Teenagers relay the news with cell phone calls, text messaging and Internet social networks, complicating the efforts of teachers, counselors and parents trying to manage grief after a young person's death. To our readers This series stems from our continuing examination of what led 19-year-old Robert Hawkins to become a mass killer last December at Omaha's Von Maur store. Today's stories describe how Internet postings, cell phones and text messages allow teens to spread their angst rapidly under the radar of adult oversight. Three-part series The World-Herald investigation into Robert Hawkins' murder spree and suicide last December leads to the discovery of a teen suicide cluster in Sarpy County. Sunday: Connections between suicidal teens cross community and school district lines. Today: Technology spreads teenage grief and angst quickly, with no parental oversight. Tuesday: A widely used but controversial suicide screening program is urged for use in Nebraska schools. Cyberspace is fertile ground for suicide contagion. It provides a forum for prolonged and excessive grieving in a highly charged, emotional atmosphere - precisely the kind of atmosphere psychologists warn to avoid after a death. It is also unmonitored by all but the most vigilant parents.
Anne Bubnic

Tweens Hooked on Phones - 0 views

  •  
    As any parent knows, tweens are crazy about cellphones. Those hoping to delay such a purchase--despite cries of "But everyone else has one!"--take note: 46% of U.S. tweens (ages 8 to 12) use cellphones, but only 26% own them, according to data released Wednesday by Nielsen Mobile. These "mobile borrowers" use their parents' phones when they go out with friends or on short trips, says Sally DePiro, a Nielsen product manager who worked on the report. The borrowing is more than an occasional habit: About 50% take their parents' phones more than three times a week. The key age for these early adopters is 10. While kids start using borrowed cellphones, on average, at around age eight-and-a-half, American tweens generally acquire their own phones between the ages of 10 and 11, reports Nielsen.
Judy Echeandia

Kansas State University Survey Delves into Cyberbullying - 0 views

  • A survey of more than 200 Kansas State University students — mostly freshmen — indicates 54 percent of them believe cyberbullying is a "minor problem" or a "common problem" among students at the university.
  • The survey used the cyberbullying definition provided in Kansas' anti-bullying law, which took effect in January 2008 and was revised in July to include cyberbullying. The law requires schools to develop anti-bullying policies, plans and preventative measures. Cyberbullying is the use of any electronic communication device, such as e-mail, instant messaging, text messages, blogs, mobile phones, pages, online games or Web sites, to create an intimidating, threatening or abusive environment.
  •  
    An online bullying survey was completed by 216 students - 93.7 percent were freshmen- enrolled in the University Experience classes at Kansas State University. The goal of the survey was to determine if bullying behavior followed students from high school into college and how freshmen perceived bullying. The survey used the cyberbullying definition provided in Kansas' anti-bullying law, which took effect in January 2008 and was revised in July to include cyberbullying. The law requires schools to develop anti-bullying policies, plans and preventative measures. Cyberbullying is the use of any electronic communication device, such as e-mail, instant messaging, text messages, blogs, mobile phones, pages, online games or Web sites, to create an intimidating, threatening or abusive environment.
Anne Bubnic

Internet 2: K20 Initiative/Global Learning - 0 views

  •  
    Internet2 is a non-profit membership organization of 208 universities working in conjunction with government and industry to operate a private national Internet Protocol (IP) network reserved for the exclusive use of the US research and education (R&E) community.As the national R&E backbone, the Internet2 Network provides connectivity between institutions and connectivity to international research and education networks thereby providing access to the global research and education community. While there are many benefits of using Internet2 in the classroom here are the top three for K12:
    1. Immediate access to experiences and expertise
    2. Access to rich multi-media digital collections and resources
    3. A truly global education network at your fingertips.

    In California, we have a localized statewide version of this effort called K12 High Speed Network/K12HSN

Anne Bubnic

Don't be illTwitterate or aTextual - 0 views

  • 1) At Marta Valle High School they held an innovation fair celebrating the successes of the innovative work teachers are doing with their students. Some students were selected as fair reporters. These students interviewed attendees with the question, "Please tell me in 140 characters or less what has impressed you most about what you've seen at our innovation fair."
  • 2) Text to capture reflections during field trips. If you're in a school where cells are banned, you may be able to have students bring them on field trips. If that is not allowed, the chaperon's devices can be used. Rather than have students walk around taking notes. Have them Tweet their reflections.
  • Have students do a daily or weekly tweet about something that day. In his post “What Did You Create Today?” (http://weblogg-ed.com 08/22/09), Will Richardson shares some great possibilities that could be used in a daily tweet: What did you teach others? What unanswered questions are you struggling with? How did you change the world in some small (or big) way? What’s something your teachers learned today? What did you share with the world?
  • ...1 more annotation...
  • Use Twitter as a tool to capture student voice by having them respond to class lectures using Twitter.
  •  
    Four ideas for using Twitter with Students.
« First ‹ Previous 41 - 60 of 1059 Next › Last »
Showing 20 items per page