Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged Use

Rss Feed Group items tagged

Vicki Davis

Twitter gets you fired in 140 characters or less - 0 views

  • Clay Shirky speaks of a day in the not-too-distant future when human resources departments will have the wisdom to look beyond social networking faux pas — at least in some small part because by then, everyone will have made at least one.
  • Rep. Pete Hoekstra, R-Mich., tweeted this as-it-happens update regarding his group’s location and destination:"Moved into green zone by helicopter Iraqi flag now over palace. Headed to new US embassy Appears calmer less chaotic than previous here."
  • This social networking comedy of errors spread like dancing hamsters across Twitter. In the retelling, "theconnor" earned the nick, "Cisco Fatty." Before the work day ended, Web sleuths revealed "theconnor's" true identity. "Theconnor" was lampooned in a popular YouTube meme. And thanks to Google Cache, the deleted content of "theconnor’s" homepage resurfaced on CiscoFatty.com, a Web site erected to commemorate this cautionary tale.
  •  
    Students need to understand that NOTHING, I repeat NOTHING Is private. Great case study about how 140 characters got someone fired before they were even hired.
Anne Bubnic

Student Fights Record of Cyberbullying - 0 views

  •  
    Katherine Evans said she was frustrated with her English teacher for ignoring her pleas for help with assignments and a brusque reproach when she missed class to attend a school blood drive. So Ms. Evans, who was then a high school senior and honor student, logged onto the networking site Facebook and wrote a rant against the teacher, Sarah Phelps.
Anne Bubnic

Cyber Relationships [Teen video] - 0 views

  •  
    Cybersafety video produced by teens at Visalia High School in partnership with I-Safe. Includes pauses for classroom discussion of key questions.
Anne Bubnic

Deter. Detect. Defend. Avoid ID Theft - 0 views

  • This website is a one-stop national resource to learn about the crime of identity theft. It provides detailed information to help you deter, detect, and defend against identity theft.  
  •  
    On the Federal Trade Commission (FTC) website consumers can learn how to avoid identity theft - and learn what to do if their identity is stolen and offers materials to use in your community.
  •  
    This site (from the federal trade commission) is a one-stop national resource to learn about the crime of identity theft. It provides detailed information to help you deter, detect, and defend against identity theft.
Anne Bubnic

Tips for Dealing with Cyberbullies - 0 views

  •  
    Tips for Dealing with Cyberbullies from the U.S. Computer Emergency Readiness Team.
Anne Bubnic

Orange County Office of Education/Cybersafety Training Videos - 0 views

  •  
    This free five-part video series on Cybersafety & Internet Awareness for Parents & Educators was produced by the Orange County Office of Education [California] and is hosted by Mark Wagner & Victor Guthrie. It includes a clip with Katie Canton of Web Wise Kids, telling the story of her experience with a man she fell in love with in a chatroom, only to later discover that he was an online predator.
Anne Bubnic

Fact or Folly - For Teachers | Introduction - 0 views

  • But the Internet is different. In most cases it has no such gatekeepers: anyone and everyone can appear to be an "expert." So to get the most out of the Internet, students need to learn two things: first, how to find good information online; and second, how to evaluate the information they find.
  • Using the template The Five Ws of Cyberspace as a guide, young people can examine the authorship, purpose, perspective and presentation of Web sites, in order to determine their credibility.
  • Deconstructing Web Pages provides a step-by-step application of the five Ws to an actual Web site - with some interesting results.
  • ...1 more annotation...
  • And finally, Quick Tips for Authenticating Online Information offers some simple and effective strategies for assessing sites.
  •  
    Anybody can post information on the Internet, making it possible to find "proof" of any ideas or beliefs you can imagine. Yet to many students, "If it's on the Internet, it must be true."
Anne Bubnic

Copyright Webquest for 6th Graders - 0 views

  •  
    The Copyright Police are checking student multimedia projects for possible copyright violations. Ignorance of the law is no excuse, and violators will be prosecuted under the federal law. The Copyright Police are having some difficulty checking leads because there are so many students creating multimedia projects. You and your group have been hired by the Copyright Police to monitor multimedia projects created in our school. The Police Chief will give you information about a multimedia project to investigate and provide some Copyright Guidelines for your group.
  •  
    The Copyright Police are checking student multimedia projects for possible copyright violations. Ignorance of the law is no excuse, and violators will be prosecuted under the federal law. The Copyright Police are having some difficulty checking leads because there are so many students creating multimedia projects. You and your group have been hired by the Copyright Police to monitor multimedia projects created in our school. The Police Chief will give you information about a multimedia project to investigate and provide some Copyright Guidelines for your group.\n
Jocelyn Chappell

Middle School Ed Tech Blog - 0 views

  • Join us live tomorrow night (Monday, April 14th) at 9:00 PM EDT as Parents as Partners is joined by special guest, Steve Hargadon, to discuss web2.0 pedagogies in schools and best practices for educating parents about these tools.
  •  
    Bumped in to this today -- would you belive in coincidences -- Parents as Partners at joined by Steve Hargadon tonight 14 April 9pm PDT (too late for GMT me) -- participate at chatroom http://edtechtalk.com/live -- to discuss web2.0 pedagogies in schools and best practices for educating parents -- I so wish I could stay up but will have to leave that for others (aka feedback request please) -- although thinking about it I might manage to get up early the following day (ouch).
Lucy Gray

Non-Apologetic Computer Ethics Education - 0 views

  •  
    A Strategy for Integrating Social Impact and Ethics into the Computer Science Curriculum from the Research Center on Computers and Society.
Lucy Gray

Nigerian Fraud Email Gallery - 0 views

  •  
    Nigerian Scam Letters: 542 different examples!
Lucy Gray

GDS | Keeping Your Children Safe with Gadgets and Gizmos - 0 views

  •  
    Links to tips and other articles.
anonymous

YouTube - A Fair(y) Use Tale - 1 views

  •  
    Professor Eric Faden of Bucknell University created this humorous, yet informative, review of copyright principles delivered through the words of the very folks we can thank for nearly endless copyright terms. View as streaming video, download as an MP4 file or watch it on YouTube.
Judy Echeandia

Seven Things All Adults Should Know About MySpace [Doug Johnson] - 0 views

  • What's a teacher to do? Stay informed about student uses of technology. Build student trust by maintaining an open mind about new social phenomena. Teach students about potential hazards of all online environments.
  •  
    This article offers seven things all adults need to know about social networking sites like MySpace.
    1. Social networking is enormously popular with young adults.
    2. Friends are probably just that.
    3. Blocking sites at school won't keep kids away from MySpace.
    4.Some degree of danger does exist for MySpace users.
    5. The MySpace organization is working toward a safer online
    6. Teachers might want to check to see if they have had a MySpace account created for them.
    7.MySpace and social networking have value.

Vicki Davis

Search and Seizure of Cell Phones: Can You Hear Me Now? - 0 views

  • May school officials lawfully “search” the confiscated cell phone to look at stored text messages, photographs, videos, and logs of incoming and outgoing calls? Clearly, the circumstances of the search must satisfy the T.L.O. standard. Not as clear, however, is whether such a search violates federal or Michigan laws regarding stored electronic communications.
  • [A] search of a student by a teacher or other school officials will be ‘justified at its inception’ when there are reasonable grounds for suspecting that the search will turn up evidence that the student has violated or is violating either the law or the rules of the school. Such a search will be permissible in its scope when the measures adopted are reasonably related to the objectives of the search and not excessively intrusive in light of the age and sex of the student and the nature of the infraction.”
  • In Klump v Nazareth Area Sch Dist, 425 F Supp 2d 622 (ED Pa, 2006), a federal district court denied the school’s motion to dismiss a lawsuit filed by a student whose cell phone was searched.
  • ...5 more annotations...
  • compensatory and punitive damages for the alleged unconstitutional search, violation of the Pennsylvania Wiretapping and Electronic Surveillance Control Act, invasion of privacy, and defamation.
  • The court ruled that the student had stated a claim for the alleged violation of his right to be free from an unreasonable search.
  • here was no basis for them to search the text and voice mail messages stored on the phone.
  • unlawful access to the stored voice mail and text message communications.
  • (2) A person shall not willfully and maliciously read or copy any message from any telegraph, telephone line, wire, cable, computer network, computer program, or computer system, or telephone or other electronic medium of communication that the person accessed without authorization. (3) A person shall not willfully and maliciously make unauthorized use of any electronic medium of communication, including the internet or a computer, computer program, computer system, or computer network, or telephone.
  •  
    Legal Implications for Searching Student Cell Phones. Although this article is written against Michigan law, it does help clarify some of the concepts for what is permissable. Note that searching a student's cell phone or wireless device without parent permission may violate state wiretapping laws.
  •  
    Confiscating and looking at information on cell phones by school officials is still not clear. This is a very interesting case study for those working with digital citizenship issues at their school.
  •  
    Fascinating article explaining Michigan take on searching and confiscating cell phones.
Anne Bubnic

K12HSN EdZone - Protected Environment for Use of Web 2.0 Tools - 0 views

  •  
    The California K-12 High Speed Network (K12HSN) is offering a comprehensive set of tools to support teaching and learning in California classrooms. This free suite of tools, known as edZone, was developed by the California Dept of Education and currently includes blogging, videoconference scheduling and a file sharing system where educators can upload videos, podcasts, images and documents. EdZone is an excellent tool to share lesson ideas, upload student learning objects, disseminate best practices, and more! EdZone will soon be expanded to include Instant Messaging, Moodle, Wikis, Social Networking, Moodle-an online course management system and other Web 2.0 tools to enhance today's classroom environment. Watch for these new tools in Summer 2008!
« First ‹ Previous 841 - 860 of 1066 Next › Last »
Showing 20 items per page