Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged a

Rss Feed Group items tagged

Anne Bubnic

Protecting Your Online Identity and Reputation - 0 views

  • Remember that nothing is temporary online. The virtual world is full of opportunities to interact and share with people around the world. It's also a place where nothing is temporary and there are no "take-backs." A lot of what you do and say online can be retrieved online even if you delete it — and it's a breeze for others to copy, save, and forward your information.
  • Mark your profiles as private. Anyone who accesses your profile on a social networking site can copy or screen-capture information and photos that you may not want the world to see. Don't rely on the site's default settings. Read each site's instructions or guidelines to make sure you're doing everything you can to keep your material private.
  • Safeguard your passwords and change them frequently. If someone logs on to a site and pretends to be you, they can trash your identity. Pick passwords that no one will guess (don't use your favorite band or your dog's birthday; try thinking of two utterly random nouns and mixing in a random number), and change them often. Never share them with anyone other than your parents or a trusted adult. Not even your best friend, boyfriend, or girlfriend should know your private passwords!
  • ...6 more annotations...
  • Don't post inappropriate or sexually provocative pictures or comments. Things that seem funny or cool to you right now might not seem so cool years from now — or when a teacher, admissions officer, or potential employer sees them. A good rule of thumb is: if you'd feel weird if your grandmother, coach, or best friend's parents saw it, it's probably not a good thing to post. Even if it's on a private page, it could be hacked or copied and forwarded.
  • Don't respond to inappropriate requests. Research shows that a high percentage of teens receive inappropriate messages and solicitations when they're online. These can be scary, strange, and even embarrassing. If you feel harassed by a stranger or a friend online, tell an adult you trust immediately. It is never a good idea to respond. Responding is only likely to make things worse, and might result in you saying something you wish you hadn't.
  • Take a breather to avoid "flaming." File this one under "nothing's temporary online": If you get the urge to fire off an angry IM or comment on a message board or blog, it's a good idea to wait a few minutes, calm down, and remember that the comments may stay up (with your screen name right there) long after you've regained your temper and maybe changed your mind.
  • Learn about copyrights. It's a good idea to learn about copyright laws and make sure you don't post, share, or distribute copyrighted images, songs, or files. Sure, you want to share them, but you don't want to accidentally do anything illegal that can come back to haunt you later.
  • Check yourself. Chances are, you've already checked your "digital footprint" — nearly half of all online users do. Try typing your screen name or email address into a search engine and see what comes up. That's one way to get a sense of what others see as your online identity.
  • Take it offline. In general, if you have questions about the trail you're leaving online, don't be afraid to ask a trusted adult. Sure, you might know more about the online world than a lot of adults do, but they have life experience that can help.
  •  
    Advice for teens from www.kidshealth.org. Here are some things to consider to safeguard your online identity and reputation:
    1. Remember that nothing is temporary online
    2. Mark your profile as private.
    3. Safeguard your passwords and change them regularly.
    4. Don't post inappropriate or sexually provocative pictures or comments.
    5. Don't respond to inappropriate requests
    6. Take a breather to avoid "flaming."
    7. Learn about copyrights.
    8. Check your digital footprint.
    9. Take it offline.
wasifali

Youtube to mp3 Downloader - 0 views

Sure! If you're looking for a YouTube to MP3 downloader, there are several online tools and software available that can help you convert YouTube videos into MP3 audio files. However, it's important...

Youtube to mp3 Downloader

started by wasifali on 14 Jul 23 no follow-up yet
wasifali

Youtube to mp3 Downloader - 0 views

Sure! If you're looking for a YouTube to MP3 downloader, there are several online tools and software available that can help you convert YouTube videos into MP3 audio files. However, it's important...

Youtube to mp3 Downloader

started by wasifali on 14 Jul 23 no follow-up yet
Vicki Davis

Susan Silverman's Lucky Ladybugs project going on for elementary - 0 views

  • A Collaborative Internet Project for K-5 Students
  • Essential Question: Why are ladybugs considered to be good luck?
  • This project will demonstrate lesson plans designed following principles of Universal Design for Learning (UDL) and examples of student work resulting from the lessons.  As teachers we should ask ourselves if there are any barriers to our students’ learning.  We should look for ways to present information and assess learning in non-text-based formats. 
  • ...5 more annotations...
  • Based on brain research and new media, the UDL framework proposes that educators design lessons with three basic kinds of flexibility: 1. Multiple formats and media are used to present information.
  • Examples: Illustrations, pictures, diagrams, video or audio clips, and descriptions 2.   Teachers use multiple strategies to engage and motivate students. 3.   Students demonstrate learning through multiple performance and product formats.
  • UDL calls for three goals to consider in designing lessons: 1.  Recognition goals: these focus on specific content that ask a student to identify who, what, where, and when. 2.  Strategic goals: these focus on a specific process or medium that asks a student to learn how to do something using problem solving and critical think skills. 3. Affective goals: these focus on a particular value or emotional outcome. Do students enjoy, and appreciate learning about the topic? Does it connect to prior knowledge and experience? Are students allowed to select and discover new knowledge?
  • Resources you might want to use: Scholastic Keys, Kid Pix, Inspiration and Kidspiration, digital camera (still and video), recording narration/music, United Streaming.  Let your imagination go!
  • This project begins on March 15, 2007.  Materials need to be e-mailed by May 31, 2008.
  •  
    An excellent project for elementary students to connect with other classes.
  •  
    A great way to get started with technology is to join in an exciting project. this project by Susan Silverman was designed using the principles of Universal Design for Learning. I've heard her present and she is a pro. (Along with my friend Jennifer Wagner.)
wasifali

Traffic Rider - 0 views

image

Traffic Rider

started by wasifali on 02 Jul 23 no follow-up yet
Anne Bubnic

Podcasting Music: The legal implications - 0 views

  • Musical works. Performance rights organizations (ASCAP, BMI and SESAC) handle copyright licenses for the performance of musical works, including their performance in a podcast. Separate licenses are necessary from each performance rights organization because each company represents different publishers of composers' musical works. Sound recordings. Copyright licenses for the playing (or "performance") of sound recordings historically have been handled directly with the owners of the works, usually record companies. (Over-the-air broadcasters are not required to obtain copyright licenses for playing sound recordings. They must, however, hold licenses for playing the underlying musical works.)
  • Reproduction. By contrast to webcasting, a podcast may include a reproduction of a sound recording. Podcasting is an interactive activity. It results in the transmission of a sound recording which is fixed and is accessible on demand by the user. The reproduction requires clearances or licenses - for the sound recording, and for the musical work. Although the performance rights societies offer licenses to cover the musical works in a podcast, no uniform or industry-wide licensing scheme has developed yet to cover the sound recording.
  • This leaves the podcaster with three choices: to attempt to obtain licenses from the record companies; to limit podcasts to sound recordings not subject to copyright protection (generally, U.S. recordings pressed before February 15, 1972 [careful: a CD reissue of a pre-1972 recording is a new, protected, sound recording]); or to eliminate sound recordings altogether from podcasts.
  •  
    Copyright law protects musical and spoken compositions, or "works"; the performance of a work preserved in a sound recording; and the sound recording itself. Podcasting implicates these in three ways: the performance of a work; the playing of a sound recording of a performance; and the reproduction of a sound recording by incorporating it into a podcast. The law is well-settled only as to the first of these.
Anne Bubnic

Libraries booking young video gamers - 0 views

  • The American Library Association has announced a new project funded with a $1 million grant from the Verizon Foundation, the charitable branch of Verizon Communications.
  • Libraries that already have mature gaming systems in place will be studied to gauge how electronic games improve players' literacy skills. Then, a dozen leading national gaming experts, including a Tucson librarian, will build a tool kit that libraries across the country can use to develop gaming programs.
  • There's growing evidence that games in general, from the traditional board versions to electronic and online ones, support literacy and 21st-century learning skills, she said, though libraries have been slow to capitalize on them.
  • ...2 more annotations...
  • for the first time ever this year, the American Library Association's annual conference had a gaming pavilion, showcasing efforts to reach a demographic — tweens, teens and 20-somethings — that's tough to pull into the library.
  • Then there's just the overall focus on puzzle-solving, Danforth noted. Unlike books, games often have multiple story lines, depending on decisions that gamers make along the way. In the overall scheme of things, deploying a warrior for one job and a wizard for another isn't that much different from a boss sending an engineer out for one task and a public relations professional for another.
  •  
    If you made a list of sounds you might hear at your local library, the rumbling of explosions and the loud hum of race-car engines probably wouldn't rank high on it. But in a darkened room at the Quincie Douglas Branch Library, about 20 preteens and teens gather around two screens. It's a mostly soundproof room, to make sure their efforts to rack up points on Nintendo's Wii and PlayStation 2 don't bother the consumers of decidedly more static media. It's a sight that could become more frequent at a library near you.
Anne Bubnic

School CyberSafety Presentation Leads to Arrest of Miami Man - 0 views

  • Attorney General Bill McCollum today announced that a Miami man is in custody on charges of sexual battery on a child. Acting on a tip received from a Clay County student at one of the Attorney General’s CyberSafety presentations, deputies from Clay County Sheriff Rick Beseler’s Office arrested Anthony Alexander Caldara, a mechanic serving active duty in the U.S. Navy, for sexually abusing a young girl. The tip was reported by the victim’s older sister to an investigator with the Attorney General’s CyberCrime Unit.
  • The older sister, a student at a local Clay County junior high school, approached the CyberCrime investigator after attending the Attorney General’s CyberSafety presentation. She reported to the investigator that she and her younger sister had been communicating with Caldara, 21, via cell phone and text messaging and Caldara had sent the children pornography. The two children eventually met Caldara in real life and a subsequent investigation revealed Caldara sexually abused the younger sister.
  •  
    Attorney General Bill McCollum today announced that a Miami man is in custody on charges of sexual battery on a child. Acting on a tip received from a Clay County student at one of the Attorney General's CyberSafety presentations, deputies from Clay County Sheriff Rick Beseler's Office arrested Anthony Alexander Caldara, a mechanic serving active duty in the U.S. Navy, for sexually abusing a young girl. The tip was reported by the victim's older sister to an investigator with the Attorney General's CyberCrime Unit.
Anne Bubnic

Cyber Bullying - School Policies? - 0 views

  • A punch in the eye seems so passé. Bullies these days are traveling in packs and using cyberspace to their humiliating messages online. Like the toughies of old, they are both boys and girls and they demand nothing less than total submission as the price of peace. It’s a jungle out there. For school districts, patrolling the hallways and adjacent grounds is just a start. In the 21st century, a new kind of vigilance is necessary—an expanded jurisdiction that serves to both stave off legal actions and ensure a safe and productive learning environment.
  • Today’s principals rely on district policy and practice to extend the presumed long arm of the law to off-campus incidents. Potentially, that could mean plunging headlong into the electronic frontier to rescue student victims and thwart cyberbullying classmates who thrive as faceless computer culprits.
  • A December 2009 study by Harvard University’s Berkman Center for Internet & Society found that students on the receiving end report greater emotional distress, are more likely to abuse substances, and are more frequently depressed.
  • ...8 more annotations...
  • The report concluded a child is more likely to face cyberbullying by fellow students than being stalked by an online predator. “Bullying and harassment are the most frequent threats minors face, both online and offline,” notes the Harvard report, Enhancing Child Safety & Online Technologies: Final Report of the Internet Safety Task Force to the Multistate Working Group on Social Networking of State Attorneys General of the United States.
  • Bullying can take a variety of forms. Incidents have included stealing passwords, impersonating the victim online, fake MySpace or Facebook pages, embarrassing photos or information being revealed, threats, rumors, and more. And, bullying tends to magnify the longer it exists.
  • Students sometimes will cyberbully teachers or other school employees
  • In January, a federal court in Connecticut ruled that Regional District 10 was within its rights to discipline a student over an off-campus blog. Judge Mark Kravitz rejected Avery Doninger’s claim that the school violated her free speech rights when they refused to let her serve as class secretary or to speak at graduation because of words she wrote at home
  • According to the Hartford Courant, the school district won “because the discipline involved participation in a voluntary extracurricular activity, because schools could punish vulgar, off-campus speech if it posed a reasonably foreseeable risk of coming onto school property, and because Doninger’s live journal post was vulgar, misleading, and created the risk of substantial disruption at school.”
  • In Florida, a high school senior and honor student was accused of cyberbullying after she wrote on Facebook: ‘’Ms. Sarah Phelps is the worst teacher I’ve ever met! To those select students who have had the displeasure of having Ms. Sarah Phelps, or simply knowing her and her insane antics: Here is the place to express your feelings of hatred.’’ Katherine Evans, who was suspended for “bullying and cyberbullying harassment toward a staff member,” sued the charter school in December 2008. A final ruling is pending.
  • In a 2007 incident, 19 students were suspended at a Catholic high school near Toronto for cyberbullying a principal on Facebook. The students called the principal a “Grinch of School Spirit” and made vulgar and derogatory comments. While the U.S. Constitution does not necessarily apply in private school settings, the incident demonstrates that this kind of behavior can happen anywhere.
  • Districts should have a cyberbullying policy that takes into account the school’s values as well as the school’s ability to legally link off-campus actions with what is happening or could happen at school.
  •  
    Good article from AMERICAN SCHOOL on the policies that schools need to have in place to protect both students and teachers from cyberbullies.
Anne Bubnic

Teachable Moments in Cyberbullying/Cyberethics - 109 views

Teachable Moment: Student Hacking Experience Made a mistake? Own it, Fix it, Learn from it." Learn how this teacher developed a student contract and handled the consequences of computer...

cyberethics students teachable moment

solospiders

Best Bamboo Cheese Board - 0 views

  •  
    My wife and I love having Best Bamboo Cheese Board and wine dates!! We usually cut up some cheese and put it on an ugly plastic board. This works great for us but looks kinda tacky when we have guests. So as we are getting into the busy football season and we have a lot of friends come over, I wanted something that looked a little more attractive. So I purchased this set! The set is a nice 13×13 cutting board with a built-in hidden cabinet for utensils. The utensils are a fork, a knife, a flat edge knife, and a sharp spatula. Each one of them is very sharp and can easily cut through hard cheese like cheddar. They all have a nice comfortable bamboo handle. The bottom part of the cutting board has a nice grippy bottom too, this will prevent sliding around and will allow the drawer to slide out smoothly.
realcounterfeits

Buy aed online - Buy fake 1000 dirhams- Real Counterfeits Money - 0 views

  •  
    Buy AED 1000 Online UAE Dirham banknotes were issued from the Central Bank of the United Arab Emirates, including this one thousand banknotes by Dirhams, in nine separate denominations. You belong to the new UAE Dirham series of banknotes. In 2000 these 1000 Dirham US banknotes were issued by the Central Bank of the United Arab Emirates. They are still in use at present. A sparrowhawk bird is on the UAE Bill of a thousand dirhams. The note 1000 UAE dirhams includes the words Central Bank of the United Arab Emirates The banknotes are sold at the lowest possible price for sale to minors. Companies such as Real Counterfeit Money give us the ability to use Emirati Dirham at the highest standard online at a very affordable price. This is better than staring at expensive cars of friends and worrying about whether or not we can afford to buy counterfeit money online. When you intend to purchase Emirati Dirham online, make sure you buy it through a reliable web services like Real Counterfeit Money. How safe are this falsified money online? The money generated by the Top Counter Money is entirely safe and secure. They are critically checked in the company's laboratories and then published for the common citizens. Guidelines and stringent protocols must be followed everywhere with fake banknotes. AED 1000 is available for sale in the online store and 100% safe online for purchasing AED 1000. Where to Buy AED 1000 Online There are a few websites that sell fake money online, but if you are a newbie, it is best for those fake money vendors to do careful research, because most of them are not so accurate. If you are not careful, you could lose your hard-earned money. Fortunately, you have a 100 % genuine direct manufacturer and retailer called Real Counterfeit Money, to help you begin your journey online in the world of fake money. Even after the distribution cycle, we have the best-quality AED 1000 for sale at the lowest affordable rates. buy aed online, fake 1000 dirham
Anne Bubnic

Letters to a Bullied Girl: Messages of Healing and Hope [Harper Collins] - 0 views

  •  
    Olivia Gardner, a northern California teenager, was severely taunted and cyber-bullied by her classmates for more than two years. News of her bullying spread, eventually reaching two teenage girls from a neighboring town, sisters Emily and Sarah Buder. The girls were so moved by Olivia's story that they initiated a letter-writing campaign to help lift her spirits. It was a tender gesture of solidarity that set off an overwhelming chain reaction of support, encouragement, and love. In Letters to a Bullied Girl, Olivia and the Buder sisters share an inspiring selection of messages that arrived from across America-the personal, often painful remembrances of former targets, remorseful bullies, and sympathetic bystanders. Letters to a Bullied Girl examines our national bullying epidemic from a variety of angles and perspectives, and includes practical guidance from bullying expert Barbara Coloroso, author of The Bully, the Bullied, and the Bystander. Though addressed to Olivia, the letters speak to all young people who have been bullied, offer advice and hope to those who suffer, and provide a wake-up call to all who have ever been involved in bullying.

    There is also a video interview with the Buder sisters on this site.

Anne Bubnic

Curbing Cyberbullying in School and on the Web - 0 views

  • Many of the most egregious acts of cyberbullying do not take place during school hours or on school networks, a situation that presents a dilemma for public school administrators: If they punish a student for off-campus behavior, they could get hit with a freedom of speech suit.  If they do nothing, students may continue to suffer and school officials theoretically could get hit with failure to act litigation. For school administrators, it appears to be an unfortunate “catch-22.” For lawyers, it’s a “perfect storm,” pitting freedom of speech advocates against the victims of cyberbullying and schools that try to intervene. There are no easy answers in this arena, few laws, and no well-established precedents that specifically deal with cyberbullying.
  • “School administrators can intervene in cyberbullying incidents, even if the incidents do not take place on school grounds, if they can demonstrate that the electronic speech resulted in a substantial disruption to the educational environment.”
  • These cases illustrate not only a lack of precedent on cyberbullying cases, but also a dilemma for school administrators on how to handle cyberbullying.  “There are few laws that address how to handle cyberbullying, and many schools don’t have an internal policy to deal with cyberbullying that takes place off-campus,” offers Deutchman.  “It may take an unfortunate and tragic event on school property to get more schools to consider tackling electronic behavior that originates off campus.  It’s only a matter of time before a cyberbully, or the victim of cyberbullying, uses deadly force during school hours.”
  • ...5 more annotations...
  • So, what should schools do in the meantime?  First, school officials should establish a consistent internal policy (much like a crisis plan) and a team (minimally made up of the principal, school counselor, and technology director) to deal with cyber-misconduct. This team should fully document disruptive incidents and the degree to which the learning environment is affected. The principal should invite the cyberbully’s parents to review the offending material before considering disciplinary action. Most parents at this point will do the right thing.
  • Second, schools should educate children, starting in elementary school, about the importance of cyber-safety and the consequences of cyberbullying, especially on the school’s own network. These rules should be clearly posted in the computer labs and written in age-appropriate language. The rules should be sent home to parents each year—and they should be posted prominently on the school’s website.
  • Third, teachers should continue incorporating in their curriculum projects that utilize the web and other powerful new technologies. This probably won’t help schools avoid lawsuits; it’s just good pedagogy. It’s not surprising that schools that keep up with the latest technology and software—and employ teachers who care about the quality of online communication—report lower incidents of cyber-misconduct.
  • In addition, schools should update their codes of conduct to include rules that can legally govern off-campus electronic communication that significantly disrupts the learning environment. They should also assign enough resources and administrative talent to deal with students who engage in cyber-misconduct. One very big caveat: Disciplining a student for off-campus electronic speech should be done only as a last resort, and certainly not before seeking legal counsel.
  • Finally, schools should realize that not all cyberbullies need to be disciplined. Schools should act reasonably, responsibly, and consistently—so as to avoid the very bullying behavior they are trying to curb. Until the courts provide clear standards in the area of off-campus electronic speech for young people, these recommendations will go a long way in making schools a safer learning environment for everyone.
  •  
    Most school administrators have more than one story to tell about cyberbullying. They report that victims of cyberbullying experience low self-esteem, peer isolation, anxiety, and a drop in their grades. They note that victims may miss class or other school-related activities. Principals also point to recent high-profile cases where cyberbullying, left unchecked, led to suicide. In response, some schools have created new policies and curbed free speech on the school's computer network and on all electronic devices used during school hours. This article offers practical advice for actions schools can take to curb bullying, ranging from policy development to education.
wasifali

Traffic Rider - 0 views

Traffic Rider (Reviews) Certainly! Traffic Rider is a popular mobile racing game developed by Soner Kara. It offers a thrilling and immersive experience of riding motorcycles in a realistic t...

Traffic Rider

started by wasifali on 02 Jul 23 no follow-up yet
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • ...3 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Anne Bubnic

Mitigating the Internet's Negative Consequences - 0 views

  •  
    For the last 11 years Marje Monroe and Doug Fodeman have worked to educate schools, parents and students about the issues that affect children in an online world. Their Web site, ChildrenOnline.org, offers practical articles, resources, research, and a monthly newsletter on the topic. Recently, the team, which has a long background in education, self-published Safe Practices for Life Online, intended to show middle and high school students what scams target them and how to use the Internet more safely. A teacher's edition of the book will be available through the International Society for Technology in Education (ISTE) in November.

Rafael Ribas

Google advice to students: Major in learning - 0 views

  • It's easy to educate for the routine, and hard to educate for the novel.
  • learning doesn't end with graduation.
  •  
    Job characteristics and strengths at work at Google -
    \n\n... analytical reasoning. Google is a data-driven, analytic company. When an issue arises or a decision needs to be made, we start with data. That means we can talk about what we know, instead of what we think we know.
    \n\n... communication skills. Marshalling and understanding the available evidence isn't useful unless you can effectively communicate your conclusions.
    \n\n... a willingness to experiment. Non-routine problems call for non-routine solutions and there is no formula for success. A well-designed experiment calls for a range of treatments, explicit control groups, and careful post-treatment analysis. Sometimes an experiment kills off a pet theory, so you need a willingness to accept the evidence even if you don't like it.
    \n\n... team players. Virtually every project at Google is run by a small team. People need to work well together and perform up to the team's expectations.\n\n... passion and leadership. This could be professional or in other life experiences: learning languages or saving forests, for example. The main thing, to paraphrase Mr. Drucker, is to be motivated by a sense of importance about what you do.
Anne Bubnic

Troubled teens spread despair in cyberspace - 0 views

  •  
    People used to say a child's suicide ripples through a community. These days, it rides an electronic wave. Teenagers relay the news with cell phone calls, text messaging and Internet social networks, complicating the efforts of teachers, counselors and parents trying to manage grief after a young person's death. To our readers This series stems from our continuing examination of what led 19-year-old Robert Hawkins to become a mass killer last December at Omaha's Von Maur store. Today's stories describe how Internet postings, cell phones and text messages allow teens to spread their angst rapidly under the radar of adult oversight. Three-part series The World-Herald investigation into Robert Hawkins' murder spree and suicide last December leads to the discovery of a teen suicide cluster in Sarpy County. Sunday: Connections between suicidal teens cross community and school district lines. Today: Technology spreads teenage grief and angst quickly, with no parental oversight. Tuesday: A widely used but controversial suicide screening program is urged for use in Nebraska schools. Cyberspace is fertile ground for suicide contagion. It provides a forum for prolonged and excessive grieving in a highly charged, emotional atmosphere - precisely the kind of atmosphere psychologists warn to avoid after a death. It is also unmonitored by all but the most vigilant parents.
« First ‹ Previous 41 - 60 of 2090 Next › Last »
Showing 20 items per page