Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged and

Rss Feed Group items tagged

Anne Bubnic

ONECHILDATATIME.NET - 0 views

  •  
    Possibilities is a national conference presented in recognition of nation missing Children's Month designed to offer quality training and information on topics and model programs of interest to leaders in the health and safety of our nations children: social workers, counselors, educators, child care and youth workers, law enforcement personnel, medical and legal professionals, parents elected officials, and other interested child advocates. Participants may attend their choice of a variety of workshops on child abuse and neglect prevention and educational programs or may select workshops for specialized training credits and professional development.
Anne Bubnic

The Impact of Facebook on Our Students - 0 views

  •  
    Doug Foderman and Marje Monroe of ChildrenOnline.org review concerns about Facebook and the risks for kids.\n\nThey have Facebook accounts and actually see it as a wonderful, and valuable, resource. However, just because Facebook says that anyone 14 years or old CAN use Facebook, doesn't mean that they should. It isn't an age-appropriate or developmentally healthy place for our children and younger teens to hang out. Facebook is not working to protect our children and the laws in our country are terribly inadequate to safeguard our children online, in general. Not enough is being done to protect and educate children and teens against the risks that come from using the Internet, and Facebook in particular. We (adults, parents, educators) need to do more.
adrinawinslet

https://issuu.com/adrinawinslet/docs/15_fascinating_ecommerce_forums_that_triggers_busi - 0 views

  •  
    eCommerce Forums help one to connect with experienced, like-minded store owners and Ecommerce professionals online, all over. An eCommerce Forum on any website is an interaction platform that allows the sellers and viewers of the website to communicate with other sellers, buyers and viewers. The eCommerce Forum is a powerful way to attract and keep visitors and buyers to an online store as they enable interaction among the visitors and in this way attract them to revisit the website in the future. Forum + Web Traffics : Forums mean nothing if you don't have traffic or members, and having the proper forum design matching your website is a must. It also includes various online store owners to share knowledge and help each other grow their businesses. You can now easily put an eCommerce Forum on your website for free. There are several websites providing this service free of charge. You will need to sign up on that website and get the forum from there for your website.
solospiders

Best Facial Hair Removal for Women - 0 views

  •  
    Best Facial Hair Removal for Women are so amazing. Just arrived today, (perfect delivery and timely) and very excited to try it. I have used numerous other brands and wanted to see how it would compare. For reference: I'm a blonde female and that means I have plenty of hair just that it is fine and colorless. So, the unboxing of this was perfect, and sealed, (no question about first-time use), and as others have stated it's very cute, and has an extra head included as well as a case, (not required for approval but sure is a plus). Very easy to begin with the loading of the battery, (not included) a bit hard to see the battery info inside the unit, but even someone with less than brilliant IQ can figure it out. The unit doesn't have a light, and from the start got warm to the surface area, but so far not hot, only warm.
Anne Bubnic

Leadership, Education & Etiquette - On or Offline [LEO] - 0 views

  • They are now developing a Web site to help educate their peers on the same issues and plan to visit elementary and middle school students this year to pass on Internet safety messages. Students also created individual blogs this week. "We're trying to develop youth to be leaders in the city and the state and the nation and the world. With the Internet, it's not just local," said Akua Goodrich, the program's director who helped found the Power Unit for Motivating Youth, an after-school and mentoring program in the city. "We have to prepare them to be safe and help spread the message."
  • "When you're a kid, you don't want to listen to an adult who doesn't know what you're going through," she said. "You're much more open to listen to your peers talk to you. It's more interesting."
  •  
    The Leadership, Education and Etiquette - On and Offline, or [Leo ] Student Leadership Training Project ended Friday with a debriefing and motivational words by the program's adult leaders. It wrapped up four days of training in which the 26 teens learned about cyber safety and social networking issues as well as peer-to-peer marketing and career preparations.
Anne Bubnic

Kids online? Cox Survey: Contact with strangers is not unusual. - 0 views

  • One in 10 of these preteenagers has responded to and chatted online with strangers, according to the Tween Internet Safety Survey, sponsored by Cox Communications and the National Center for Missing and Exploited Children.
  • 90 percent of American kids have used the Internet by age 9 and more than a third of 11- and 12-year-olds have a profile on social-network sites such as MySpace and Facebook.
  • Of the tweens with social-network profiles, 61 percent post personal photos online, 48 percent admit to posting a fake age online and 51 percent have received messages from people they didn't know.
  • ...2 more annotations...
  • The survey showed tweens' online presence doubles or even triples among 8- to 10-year-olds and 11- and 12-year-olds: The 42 percent of children 8 to 10 with personal e-mail accounts increases to 71 percent for those 11 and 12, for instance, and 41 percent of 11- and 12-year-olds have an instant-messaging screen name, compared with 15 percent for kids 8 to 10.
  • Half of the 11- and 12-year-olds have their own cell phones -- used for text messaging and taking and transmitting digital photos as well as for traditional calling -- while 19 percent of those 8 to 10 have their own cell phones.
  •  
    One in five of the nation's wired "tweens" -- kids ages 8 to 12 -- has posted personal information on the Internet, and more than a fourth have been contacted online by strangers, a poll released Tuesday found.
Anne Bubnic

Cyber Safety/Social Networking Safety Measures - 0 views

  • For the past two years Blumenthal and other states' attorneys general have negotiated with both Facebook and MySpace to implement more than 60 new safety measures to protect children from online predators and from gaining access to inappropriate content, like pornography.
  • Under the agreement with Facebook, its officials have agreed to prominently display safety tips, and to require users under the age of 18 to affirm that they have read the tips. Users over 18 can no longer search for under-18 users, and Facebook officials will automatically be notified when someone under 18 is in danger of providing personal information to an adult user.
  • Parents will also be provided with tools to remove a child's profile from the site. Inappro­priate images and content will be removed, and ads for age-restricted products, like alcohol and tobacco, will be limited to users old enough to purchase those items. Most significantly, Facebook agreed to diligently search for and remove profiles of registered sex offenders, and it will "in­crease efforts to remove groups for incest, pedophilia, cyber-bullying and other violations of the site's terms of service and expel from the site individual violators of those terms."
  • ...2 more annotations...
  • Under the agreement, MySpace now allows parents to submit their child's e-mail address to prevent anyone from using that e-mail address to set up a profile (e-mail addresses are required in order to set up an account for either Facebook or MySpace, and people may search for "friends" by entering e-mail addresses). For anyone under 16, MySpace will automatically set the profile to "private," allowing only approved people to view the profile. There is now a closed "high school" section of the site set aside for users under 18.
  • Like Facebook, MySpace officials will also "obtain and constantly update a list of pornographic Web sites and regularly sever any links" between the sites. MySpace agreed to provide a way to report abuse on every page that contains content. The site's officials also prom­ised to respond to complaints of inappropriate content within 72 hours.
  •  
    Connecticut Attorney General Richard Blumenthal has made it one of his priorities to install methods of protection for the state's children when it comes to using these Web sites, hoping to "make social networking safer," according to a press release generated by his office. Efforts by Facebook and MySpace to protect privacy are described in this article.
Anne Bubnic

Footprints in the Digital Age - 0 views

  • In the Web 2.0 world, self-directed learners must be adept at building and sustaining networks.
  • As the geeky father of a 9-year-old son and an 11-year-old daughter, one of my worst fears as they grow older is that they won't be Googled well. Not that they won't be able to use Google well, mind you, but that when a certain someone (read: admissions officer, employer, potential mate) enters "Tess Richardson" into the search line of the browser, what comes up will be less than impressive. That a quick surf through the top five hits will fail to astound with examples of her creativity, collaborative skills, and change-the-world work. Or, even worse, that no links about her will come up at all. I mean, what might "Your search did not match any documents" imply?
  • digital footprints—the online portfolios of who we are, what we do, and by association, what we know—are becoming increasingly woven into the fabric of almost every aspect of our lives.
  • ...6 more annotations...
  • So what literacies must we educators master before we can help students make the most of these powerful potentials? It starts, as author Clay Shirky (2008) suggests, with an understanding of how transparency fosters connections and with a willingness to share our work and, to some extent, our personal lives
  • Publishing content online not only begins the process of becoming "Googleable," it also makes us findable by others who share our passions or interests.
  • Although many students are used to sharing content online, they need to learn how to share within the context of network building. They need to know that publishing has a nobler goal than just readership—and that's engagement.
  • As Stanford researcher Danah Boyd (2007) points out, we are discovering the potentials and pitfalls of this new public space. What we say today in our blogs and videos will persist long into the future and not simply end up in the paper recycling bin when we clean out our desks at the end of the year.
  • Although Laura is able to connect, does she understand, as researcher Stephen Downes (2005) suggests, that her network must be diverse, that she must actively seek dissenting voices who might push her thinking in ways that the "echo chamber" of kindred thinkers might not? Is she doing the work of finding new voices to include in the conversation?
  • Here are five ideas that will help you begin building your own personal learning network. Read blogs related to your passion. Search out topics of interest at http://blogsearch.google.com and see who shares those interests. Participate. If you find bloggers out there who are writing interesting and relevant posts, share your reflections and experiences by commenting on their posts. Use your real name. It's a requisite step to be Googled well. Be prudent, of course, about divulging any personal information that puts you at risk, and guide students in how they can do the same. Start a Facebook page. Educators need to understand the potential of social networking for themselves. Explore Twitter (http://twitter.com), a free social networking and micro-blogging service that enables users to exchange short updates of 140 characters or fewer. It may not look like much at first glance, but with Twitter, the network can be at your fingertips.
  •  
    Giving Students Ownership of Learning: Footprints in the Digital Age. In the Web 2.0 world, self-directed learners must be adept at building and sustaining networks.
Anne Bubnic

Digital Lifestyle Youth Culture Profile Report 2008 - 0 views

  • For example, miniDV cameras are not only among the new tools of self-expression, but the very act of creating personal videos with friends and creating events and key themes to shoot have become key aspects of entertainment in and of itself. To this generation, playing music via your cell phone, and movies and TV shows via your iPod are a given. Emailing is considered too old-school by many, whereas texting is outpacing cell phone calls. These things also go hand-in-hand with changes in online shopping patterns, top website preferences, communication and blogging patterns, and new habits for using social networks—not to mention the tremendous changes in preferred social networks and profile page usage patterns in general. These things are changing the paradigm of how the businesses of entertainment, communication, retail, marketing, advertising, and branding have been done in the past.
  • Unfortunately, as more companies pour big money into expanding their new media marketing components, as many people have discovered, the Field of Dreams theory (“if we build it, they will come”) certainly doesn’t apply when it comes to reaching savvy youth today. Popping up a site (or social network for that matter) no matter how cool it is means nothing if you can’t reach the market it’s intended for. This Report, therefore, also includes a great deal about how young people find out about new websites, communicate with others, and other forms of grassroots networking.
  • Overall, the Digital Lifestyle Youth Culture Profile Report 2008 not only reveals traits by target demographics, but also the growing generation gap occurring even within this generation.
  •  
    [Market Research Report]

    "Young people are the inherent trend leaders when it comes to new technology and usage patterns, and are the ones pushing forward the speed of change in communication and information technology. This Report reveals that it may be imperative for some brands to re-think strategies--even among progressive companies--if they are to reach youth culture effectively.
Anne Bubnic

The Impact of Cyberbullying [PDF] - 0 views

  •  
    2005 Report by Dr. Beth Manke, Associate Professor, Human Development, California State University, Long Beach. Often the most dramatic incidents of cyberbullying get the attention of educators, parents and the authority. Those incidents that involve threats, particularly death threats and those that result in school shootings and suicide attempts prompt intervention for both the perpetrators and victims. We must remember, however, that all cyberbullying, even the less dramatic incidents including the spreading of rumors and saying mean things online can be harmful as they can erode a child's self esteem and confidence and lead to later academic difficulties, interpersonal problems and psychological distress.
Vicki Davis

Susan Silverman's Lucky Ladybugs project going on for elementary - 0 views

  • A Collaborative Internet Project for K-5 Students
  • Essential Question: Why are ladybugs considered to be good luck?
  • This project will demonstrate lesson plans designed following principles of Universal Design for Learning (UDL) and examples of student work resulting from the lessons.  As teachers we should ask ourselves if there are any barriers to our students’ learning.  We should look for ways to present information and assess learning in non-text-based formats. 
  • ...5 more annotations...
  • Based on brain research and new media, the UDL framework proposes that educators design lessons with three basic kinds of flexibility: 1. Multiple formats and media are used to present information.
  • Examples: Illustrations, pictures, diagrams, video or audio clips, and descriptions 2.   Teachers use multiple strategies to engage and motivate students. 3.   Students demonstrate learning through multiple performance and product formats.
  • UDL calls for three goals to consider in designing lessons: 1.  Recognition goals: these focus on specific content that ask a student to identify who, what, where, and when. 2.  Strategic goals: these focus on a specific process or medium that asks a student to learn how to do something using problem solving and critical think skills. 3. Affective goals: these focus on a particular value or emotional outcome. Do students enjoy, and appreciate learning about the topic? Does it connect to prior knowledge and experience? Are students allowed to select and discover new knowledge?
  • Resources you might want to use: Scholastic Keys, Kid Pix, Inspiration and Kidspiration, digital camera (still and video), recording narration/music, United Streaming.  Let your imagination go!
  • This project begins on March 15, 2007.  Materials need to be e-mailed by May 31, 2008.
  •  
    An excellent project for elementary students to connect with other classes.
  •  
    A great way to get started with technology is to join in an exciting project. this project by Susan Silverman was designed using the principles of Universal Design for Learning. I've heard her present and she is a pro. (Along with my friend Jennifer Wagner.)
Anne Bubnic

WEB|WISE|KIDS: MISSING [Interactive Software Adventure] - 0 views

  •  
    MISSING, from Web Wise Kids, is designed to SHOW rather than TELL children about online safety. It's a fun and positive way to teach children how to avoid danger on the Internet. The interactive software adventure tells the story of Zack, a kid in Vancouver, Canada who forms an online friendship with Fantasma. This guy is so cool - he has an online magazine about beach life in California and he sends Zack great stuff, like graphic arts and software. Little does Zack know that he is a predator. After Zach agrees to go to San Diego to be with Fantasma, players work with a detective to find and rescue Zack and arrest Fantasma. Available both as a home edition and a school edition. [Windows and Mac OSX versions available]. Note: Local middle school science teachers have successfully worked this program into their science curriculum since solving the game involves researching and collecting clues.
Vicki Davis

Search and Seizure of Cell Phones: Can You Hear Me Now? - 0 views

  • May school officials lawfully “search” the confiscated cell phone to look at stored text messages, photographs, videos, and logs of incoming and outgoing calls? Clearly, the circumstances of the search must satisfy the T.L.O. standard. Not as clear, however, is whether such a search violates federal or Michigan laws regarding stored electronic communications.
  • [A] search of a student by a teacher or other school officials will be ‘justified at its inception’ when there are reasonable grounds for suspecting that the search will turn up evidence that the student has violated or is violating either the law or the rules of the school. Such a search will be permissible in its scope when the measures adopted are reasonably related to the objectives of the search and not excessively intrusive in light of the age and sex of the student and the nature of the infraction.”
  • In Klump v Nazareth Area Sch Dist, 425 F Supp 2d 622 (ED Pa, 2006), a federal district court denied the school’s motion to dismiss a lawsuit filed by a student whose cell phone was searched.
  • ...5 more annotations...
  • compensatory and punitive damages for the alleged unconstitutional search, violation of the Pennsylvania Wiretapping and Electronic Surveillance Control Act, invasion of privacy, and defamation.
  • The court ruled that the student had stated a claim for the alleged violation of his right to be free from an unreasonable search.
  • here was no basis for them to search the text and voice mail messages stored on the phone.
  • unlawful access to the stored voice mail and text message communications.
  • (2) A person shall not willfully and maliciously read or copy any message from any telegraph, telephone line, wire, cable, computer network, computer program, or computer system, or telephone or other electronic medium of communication that the person accessed without authorization. (3) A person shall not willfully and maliciously make unauthorized use of any electronic medium of communication, including the internet or a computer, computer program, computer system, or computer network, or telephone.
  •  
    Legal Implications for Searching Student Cell Phones. Although this article is written against Michigan law, it does help clarify some of the concepts for what is permissable. Note that searching a student's cell phone or wireless device without parent permission may violate state wiretapping laws.
  •  
    Confiscating and looking at information on cell phones by school officials is still not clear. This is a very interesting case study for those working with digital citizenship issues at their school.
  •  
    Fascinating article explaining Michigan take on searching and confiscating cell phones.
Anne Bubnic

YPulse [Anastasia Goodstein] - 0 views

  •  
    Ypulse is a media platform for youth media and marketing professionals, founded in May of 2004 by journalist Anastasia Goodstein. It provides news, commentary and resources about commercial media for teens (teen magazines, websites), entertainment for teens (movies, video games, television, music, books), technology used by teens (cell phones, instant messaging, hardware and software), the news media's desire to attract teens (newspapers, cable news), marketing and advertising (targeting the teen market) and non-profit youth media (highlighting organizations' efforts at promoting youth voices in media and creating media by and for youth). Anastasia is also the author of Totally Wired: What Teens and Tweens are Really Doing on Line.

Anne Bubnic

FactCheckED.org - 0 views

  •  
    The Internet can be a rich and valuable source of information - and an even richer source of misinformation. Sorting out the valuable claims from the worthless ones is tricky, since at first glance a Web site written by an expert can look a lot like one written by your next-door neighbor. This lesson offers students background and practice in determining authority on the Internet - how to tell whether an author has expertise or not, and whether you're getting the straight story.
  •  
    The Internet can be a rich and valuable source of information - and an even richer source of misinformation. Sorting out the valuable claims from the worthless ones is tricky, since at first glance a Web site written by an expert can look a lot like one written by your next-door neighbor. This lesson offers students background and practice in determining authority on the Internet - how to tell whether an author has expertise or not, and whether you're getting the straight story.
  •  
    The Internet can be a rich and valuable source of information - and an even richer source of misinformation. Sorting out the valuable claims from the worthless ones is tricky, since at first glance a Web site written by an expert can look a lot like one written by your next-door neighbor. This lesson offers students background and practice in determining authority on the Internet - how to tell whether an author has expertise or not, and whether you're getting the straight story.
adjustingto6figu

Why Should You Become an Independent Claims Adjuster?  - Adjusting to 6 Figures - 0 views

  •  
    There are many professions in the world that promise to be rewarding and fulfilling. Becoming and independent claims adjuster is one of them. Though this might not be a profession you have heard of before, it does pay a substantial amount and is in high demand. It is a serious decision to follow this career path, and worth considering if you are looking for a stable career where you can help others and where you are able to make your own decisions. If you want to be in charge of your own day, travel, and set your own schedule, then this is the perfect opportunity, as an adjuster works independently in the field, and is responsible for his own work. This article will provide a look at the role of an independent claims adjuster, the duties it entails, and what the benefits are to taking on this type of position.
Anne Bubnic

Digital Underground Storytelling For Youth - 0 views

  •  
    Student -created videos telling powerful stories!! D.U.S.T.Y. is an afterschool program for middle and high school students in Oakland, CA. DUSTY students work on computers to create their own Digital Stories, as well at to generate rap and hip hop "beats and rhymes." Throughout the creative process, students learn to master programs such as Adobe Photoshop, Adobe Premiere, iMovie, and Fruity Loops with the help of skilled instructors. At the end of each semester, the students' creative masterpieces, including digital stories, raps, beats, and performances are showcased in some sort of final event at The Parkway Theatre, The Metro, and other local venues.

  •  
    In this information technology age, children and youth in West and East Oakland face the additional disadvantage of a digital divide, which separates ethnicities, socio-economic classes, genders, and ages. Youth from low-income communities rarely have access to cutting edge communication technologies or, just as importantly, to empowering uses of them. A comparison between the number of computers per Oakland school with the schools' statewide academic performance ranking, or API, revealed that some schools with high numbers of computers have very low API's. This discrepancy suggests that simply having technology is not enough; rather, to improve student academic outcomes, technology must be meaningfully used.
Anne Bubnic

Digital Natives and the Myth of Multi-Tasking - 0 views

  • Dave Crenshaw discussed his latest book, The Myth of Multitasking. Crenshaw makes a strong distinction behind “background tasking”—reading a magazine while waiting in line, for instance, or listening to music while coding—and “switch-tasking.” Most of the time, when we talk about “multi-tasking,” we’re actually talking about the very costly practice of “switch-tasking.” Every time you switch your attention from one place to another—even from one browser window to another—you take a significant hit to your focus
  • Switch-tasking, he definitively proves, causes you to execute each task more slowly than you would otherwise, with more errors
  • pecifically, what can parents, teachers, and employers do to help their kids, students, and employees focus their attention more effectively? As a kid, student, and employee myself, I have to say that I believe the solution is emphatically not to limit access—at least not for older teens. Rather, I think the key lies in laying out the facts and discussing strategies. Information overload and the allure of infinite access, after all, are challenges that affect everyone with an internet connection—not just young people. And, though writing a stellar book report might not be a cause compelling enough to warrant total focus, every young person will at some point find a pursuit worth paying attention to. Maybe it’s writing short stories; maybe writing music. Maybe it’s making art. But when that pursuit comes along, they’re going to want to know how to firewall their attention, focus their efforts, and—for once—stop switching.
  •  
    What ever happened to old-fashioned "discipline?" This question has come up constantly in my conversations with parents and teachers over the course of my involvement with the Digital Natives project. When parents glance over and see not only 50 browser tabs open on the family computer, but iTunes and a computer game and AIM too-with a book report relegated to a tiny corner of the screen-they're understandably bewildered. How do kids ever get anything done? "I'm just really good at multi-tasking, Mom," a savvy student might reply. And, as long as the work gets done, it seems hard to argue with that logic.
Anne Bubnic

Humiliation and gossip are weapons of the cyberbully - 0 views

  • ead teachers are being advised to draw up new rules on mobile phone use amid a growing number of cases of what is now known as “cyber-bullying”. In many secondary schools, over 90% of bullying cases are through text messages or internet chatrooms. It is hoped that the rules about mobile phone use will protect children from abusive texts, stop phones going off in class and prevent mobiles being taken into exam halls.
  • Although the majority of kids who are harassed online aren’t physically bothered in person, the cyber-bully still takes a heavy emotional toll on his or her victims. Kids who are targeted online are more likely to get a detention or be suspended, skip school and experience emotional distress, the medical journal reports. Teenagers who receive rude or nasty comments via text messages are six times more likely to say they feel unsafe at school.
  • The problem is that bullying is still perceived by many educators and parents as a problem that involves physical contact. Most enforcement efforts focus on bullying in school classrooms, corridors and toilets. But given that 80% of adolescents use mobile phones or computers, “social interactions have increasingly moved from personal contact at school to virtual contact in the chatroom,'’ write Kirk R. Williams and Nancy G. Guerra, co-authors of one of the journal reports. “Internet bullying has emerged as a new and growing form of social cruelty.'’
  • ...1 more annotation...
  • Cyber-bullying tactics include humiliation, destructive messages, gossip, slander and other “virtual taunts” communicated through e-mail, instant messaging, chatrooms and blogs. The problem, of course, is what to do about it. While most schools do not allow pupils to use their mobiles in the school building, an outright ban is deemed unworkable. Advances in technology are throwing up new problems for teachers to deal with. Children use their phones to listen to music, tell the time or as a calculator. Cyber-bullies sometimes disclose victims' personal data on websites or forums, or may even attempt to assume the identity of their victim for the purpose of publishing material in their name that defames them or exposes them to ridicule.
  •  
    As more and more people have access to computers and mobile phones, a new risk to youngsters has begun to emerge. Electronic aggression, in the form of threatening text messages and the spread of online rumours on social networking sites, is a growing concern.
Vicki Davis

Think.com - Safety and Netiquette Lesson - 0 views

  • Identify and provide examples of proper and improper netiquette; Generate a list of preferred web behaviors for their class; Understand and use a few Think.com content creation tools; Define "safety" and describe/draw an environment that values safety; Develop a greater sense of personal responsibility and web community; and Define the following words: accountable, community, enforcement, environment, etiquette, inappropriate, law, netiquette, private, responsible, rule, safety.
  •  
    Think.com's safety lesson with nets standards. Think.com is excellent to use with younger students and is very walled and has an excellent profanity filter. I highly recommend it and have personally used it for a summer blogging project. Excellent site. It also requires an extensive verification process by the participating schools.
  •  
    Excellent lesson plan and activities from think.com for teaching digital citizenship, particularly safety and netiquette.
« First ‹ Previous 61 - 80 of 2450 Next › Last »
Showing 20 items per page