Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged answered

Rss Feed Group items tagged

Anne Bubnic

A Teen Talks About Texting and What Parents/Educators Need to Know About it - 0 views

  •  
    For "real" answers about why and how kids text, we went to a pro - a teen who's been texting for years. Jasmine Gregory, 17, discusses her texting habits and offers advice to concerned parents/educators
Anne Bubnic

What Kind of Tech User Are You? - 0 views

  •  
    The questions here allow you to place yourself in one of the categories in the Pew Internet Project's Typology of Information and Communication Technology Users. To identify the typology group to which you belong, please answer the questions below. When you press the 'Calculate My Results' button, a new page will tell you in which group you fit, along with a description of the general characteristics of that group.
Anne Bubnic

Managing Your Digital Footprint - 0 views

  •  
    When it comes to job hunting, people have no shortage of concerns: preparing a compelling resume, providing polished answers to interview questions, and having excellent references, just to name a few. But since the word "Google" became a verb, job seekers have one more thing to worry about: ensuring their online records won't deter hiring managers from making a job offer. Many employers are incorporating an informal online search of applicants into their review process. Whether or not negative information about you exists on the web, it's a good idea to ensure there are plenty of positive associations. This article from the folks at Adobe makes four recommendations for how to manage your digital footprint.
Anne Bubnic

Teens take media literacy courses - 0 views

  • nearly 40% of high school students get exposure to media literacy in their health and social studies classes, where state support has made it standard to critically analyze tobacco and alcohol advertising.
  •  
    The average teenager spends more than three hours a day watching TV, but only 43 minutes reading, according to a study by the Kaiser Family Foundation, data which suggests that as important as English literature and composition courses are to a proper high school education, something valuable is missing from the curriculum. A number of schools are already answering that need, offering media literacy programs that teach teens to recognize and deconstruct the ways messages are made in film, television and new media.
Anne Bubnic

Searching for Solutions to Cyberbullying - 0 views

  •  
    This article, by John Palfree, is part of an online symposium on the First Amendment Center Online titled Cyberbullying & Public Schools. The author concludes that there is no easy answer to the problem of online bullying and that the most effective approach - education, with a view toward establishing positive social norms - is the hardest to accomplish. John Palfrey chaired the Internet Safety Technical Task Force in 2008. He is the co-author of Born Digital: Understanding the First Generation of Digital Natives\n\n
Anne Bubnic

The Google+ project: real life sharing, rethought for the web. - 3 views

  •  
    Google's answer to Facebook. See the article on the Google Blog for more information: http://bit.ly/google_plus_project
Go Jobio

Confidence - 0 views

shared by Go Jobio on 23 Dec 14 - No Cached
  •  
    We can also call this high self-esteem. It's not that you think you're perfect and never make mistakes. It's about being able to deal with the pressures of making mistakes, figuring out where things went wrong, and correcting the issues. Knowing how to be calm in the midst of not knowing the answer, patiently but vigorously searching, and finding the solution! Confidence ensures high levels of work. No employer wants to hire a falsely humble employee who hates themselves when making a mistake. An employer wants to know that if and when you make a mistake, or challenges arise, you will do whatever it takes to overcome that challenge and conquer it.
s1umdog

How Singapore Fixed Their Food Waste Problem By Maggots - 0 views

  •  
    The Southeast Asian city-state is rapidly filling up its landfill. Could maggots be the answer to reducing food waste Written by Claire T...
adjustingto6figu

Servant Leadership: What Does It Mean to be a Leader? - Adjusting to 6 Figures - 0 views

  •  
    In today's business environment, it is easy to get caught up in the different trends that plague leadership. What exactly does being a leader mean? Many times, people fail at answering this question, as leadership means different things to different people. In some cases, it may mean taking responsibility or risks, and moving forward even if that means doing so alone.
buyglobalshop

Buy Verified Bitmark Accounts - Get 100% Full Verified Best and cheap ... - 0 views

  •  
    Have you ever wondered what Bitmark Accounts are and how they can benefit you? Bitmark Accounts are a key feature of the Bitmark blockchain platform, allowing users to securely store and manage their digital assets. Whether you're new to the world of blockchain technology or a seasoned pro, understanding Bitmark Accounts is crucial for maximizing the potential of your digital assets. Are Bitmark Accounts safe? In today's digital age, concerns about online security and privacy are at an all-time high. With the rise of cryptocurrency and blockchain technology, more people are exploring the world of digital assets and looking for ways to keep their investments safe. One of the platforms gaining attention in this space is Bitmark, a cryptocurrency exchange that offers users the ability to create accounts to store and manage their assets. Buy Verified Bitmark Accounts However, as with any online platform, there are questions and uncertainties about the safety and security of Bitmark accounts. In this article, we will take a closer look at the measures in place to protect users' funds and personal information on Bitmark, as well as explore some best practices for keeping your account secure. By understanding the risks and benefits of using Bitmark, users can make informed decisions about how to protect their digital assets in this evolving landscape of cryptocurrency. Can I use my Bitmark Account to trade cryptocurrencies? Many people wonder if they can use their Bitmark Account to trade cryptocurrencies. The answer to this question is yes, you can use your Bitmark Account to trade cryptocurrencies. Buy Verified Bitmark Accounts Trading cryptocurrencies on Bitmark can be a great way to grow your investment portfolio. You will have access to a wide range of cryptocurrencies, giving you plenty of options to choose from. Bitmark also offers a user-friendly platform that makes it easy for even beginners to navigate and trade cryptocurrencies. How can I deposit fund
Phil Macoun

Digital-ID - home - 1 views

  • We've created the Digital ID wiki with a two-fold purpose: Provide students, teachers, and administrators with a toolkit of reliable information, resources, and guidelines to help all of us learn how to be upstanding Digital Citizens who maintain a healthy Digital Identity (ID) in the 21st Century.Build a collaborative platform for teachers and students the world over to contribute to our ever-growing curriculum collaborations and student-created content. Our goal is to help our students answer these three Essential Questions: What does it mean to be a (digital) citizen?What are my rights as a citizen?What are my responsibilities as a citizen?
Anne Bubnic

Curbing Cyberbullying in School and on the Web - 0 views

  • Many of the most egregious acts of cyberbullying do not take place during school hours or on school networks, a situation that presents a dilemma for public school administrators: If they punish a student for off-campus behavior, they could get hit with a freedom of speech suit.  If they do nothing, students may continue to suffer and school officials theoretically could get hit with failure to act litigation. For school administrators, it appears to be an unfortunate “catch-22.” For lawyers, it’s a “perfect storm,” pitting freedom of speech advocates against the victims of cyberbullying and schools that try to intervene. There are no easy answers in this arena, few laws, and no well-established precedents that specifically deal with cyberbullying.
  • “School administrators can intervene in cyberbullying incidents, even if the incidents do not take place on school grounds, if they can demonstrate that the electronic speech resulted in a substantial disruption to the educational environment.”
  • These cases illustrate not only a lack of precedent on cyberbullying cases, but also a dilemma for school administrators on how to handle cyberbullying.  “There are few laws that address how to handle cyberbullying, and many schools don’t have an internal policy to deal with cyberbullying that takes place off-campus,” offers Deutchman.  “It may take an unfortunate and tragic event on school property to get more schools to consider tackling electronic behavior that originates off campus.  It’s only a matter of time before a cyberbully, or the victim of cyberbullying, uses deadly force during school hours.”
  • ...5 more annotations...
  • So, what should schools do in the meantime?  First, school officials should establish a consistent internal policy (much like a crisis plan) and a team (minimally made up of the principal, school counselor, and technology director) to deal with cyber-misconduct. This team should fully document disruptive incidents and the degree to which the learning environment is affected. The principal should invite the cyberbully’s parents to review the offending material before considering disciplinary action. Most parents at this point will do the right thing.
  • Second, schools should educate children, starting in elementary school, about the importance of cyber-safety and the consequences of cyberbullying, especially on the school’s own network. These rules should be clearly posted in the computer labs and written in age-appropriate language. The rules should be sent home to parents each year—and they should be posted prominently on the school’s website.
  • Third, teachers should continue incorporating in their curriculum projects that utilize the web and other powerful new technologies. This probably won’t help schools avoid lawsuits; it’s just good pedagogy. It’s not surprising that schools that keep up with the latest technology and software—and employ teachers who care about the quality of online communication—report lower incidents of cyber-misconduct.
  • In addition, schools should update their codes of conduct to include rules that can legally govern off-campus electronic communication that significantly disrupts the learning environment. They should also assign enough resources and administrative talent to deal with students who engage in cyber-misconduct. One very big caveat: Disciplining a student for off-campus electronic speech should be done only as a last resort, and certainly not before seeking legal counsel.
  • Finally, schools should realize that not all cyberbullies need to be disciplined. Schools should act reasonably, responsibly, and consistently—so as to avoid the very bullying behavior they are trying to curb. Until the courts provide clear standards in the area of off-campus electronic speech for young people, these recommendations will go a long way in making schools a safer learning environment for everyone.
  •  
    Most school administrators have more than one story to tell about cyberbullying. They report that victims of cyberbullying experience low self-esteem, peer isolation, anxiety, and a drop in their grades. They note that victims may miss class or other school-related activities. Principals also point to recent high-profile cases where cyberbullying, left unchecked, led to suicide. In response, some schools have created new policies and curbed free speech on the school's computer network and on all electronic devices used during school hours. This article offers practical advice for actions schools can take to curb bullying, ranging from policy development to education.
Anne Bubnic

Messaging Shakespeare | Classroom Examples | - 0 views

  • Brown's class was discussing some of the whaling calculations in Moby Dick. When one student asked a question involving a complex computation, three students quickly pulled out their cell phones and did the math. Brown was surprised to learn that most cell phones have a built-in calculator. She was even more surprised at how literate her students were with the many functions included in their phones. She took a quick poll and found that all her students either had a cell phone or easy access to one. In fact, students became genuinely engaged in a class discussion about phone features. This got Brown thinking about how she might incorporate this technology into learning activities.
  • Brown noticed that many students used text messaging to communicate, and considered how she might use cell phones in summarizing and analyzing text to help her students better understand Richard III. Effective summarizing is one of the most powerful skills students can cultivate. It provides students with tools for identifying the most important aspects of what they are learning, especially when teachers use a frame of reference (Marzano, Pickering, & Pollock, 2001). Summarizing helps students identify critical information. Research shows gains in reading comprehension when students learn how to incorporate isummary framesi (series of questions designed to highlight critical passages) as a tool for summarizing (Meyer & Freedle, 1984). When students use this strategy, they are better able to understand what they are reading, identify key information, and provide a summary that helps them retain the information (Armbruster, Anderson, & Ostertag, 1987).
  • Text messaging is a real-world example of summarizing—to communicate information in a few words the user must identify key ideas. Brown saw that she could use a technique students had already mastered, within the context of literature study.
  • ...2 more annotations...
  • To manage the learning project, Brown asked a tech-savvy colleague to help her build a simple weblog. Once it was set up, it took Brown and her students 10 minutes in the school's computer lab to learn how to post entries. The weblog was intentionally basic. The only entries were selected passages from text of Richard III and Brown's six narrative-framing questions. Her questions deliberately focused students' attention on key passages. If students could understand these passages well enough to summarize them, Brown knew that their comprehension of the play would increase.
  • Brown told students to use their phones or e-mail to send text messages to fellow group members of their responses to the first six questions of the narrative frame. Once this was completed, groups met to discuss the seventh question, regarding the resolution for each section of the text. Brown told them to post this group answer on the weblog.
  •  
    Summarizing complex texts using cell phones increases understanding.
Anne Bubnic

Text Unto Others... As You Would Have Them Text Unto You - 0 views

  • t's nothing anyone would have thought necessary to do only a decade ago, but the concept of citizenship no longer exists only within the realm of the physical world. With K-12 students seeming to at all times have one foot in the real world and one in the virtual, school districts are starting to acknowledge a new collective responsibility: to teach kids what it means to be a good digital citizen and how to go about being one. The answer follows the same rules entrenched in the prescription for being a good citizen on the ground: Obey the law, have respect for others, act civilly and sensibly.
  •  
    Schools can teach basic principles of good citizenship to help shape students' behavior in the virtual world.
anonymous

Online Predators and Their Victims - 0 views

  • My (Liz B. Davis ) Summary of Key Points (All are quotes directly from the article): Online "Predators" and Their Victims. Myths, Realities, and Implications for Prevention and Treatment. by: Janis Wolak, David Finkelhor, and Kimberly J. Mitchell - University of New Hampshire and Michele L. Ybarra - Internet Solutions for Kids, Inc.
  • The publicity about online"predators" who prey on naive children using trickery and violence is largely inaccurate.
  • adult offenders who meet, develop relationships with, and openly seduce underage teenagers
  • ...21 more annotations...
  • In the great majority of cases, victims are aware they are conversing online with adults. In the N-JOV Study, only 5% of offenders pretended to be teens when they met potential victims online. (112)
  • Offenders rarely deceive victims about their sexual interests.
  • promises of love and romance
  • 99% of victims of Internet-initiated sex crimes in the N-JOV Study were 13 to 17 years old, and none were younger than 12. 48% were 13 or 14 years old. (115)
  • it was those 15-17 years of age who were most prone to take risks involving privacy and contact with unknown people. (115)
  • take place in isolation and secrecy, outside of oversight by peers, family  members, and others in the youth's face-to-face social networks (115)
  • Most of the online child molesters described in the N-JOV Study met their victims in chatrooms. In a 2006 study, about one third of youths who received online sexual solicitation had received them in chatrooms. (116)
  • Youth internet users with histories of offline sexual or physical abuse appear to be considerably more likely to receive online aggressive sexual solicitations. (117)
  • ..Although Internet safety advocates worry that posting personal information exposes youths to online molesters, we have not found empirical evidence that supports this concern. It is interactive behaviors, such as conversing online with unknown people about sex, that more clearly create risk. (117)
  • Online molesters do not appear to be stalking unsuspecting victims but rather continuing to seek youths who are susceptible to seduction. (117)
  • maintaining online blogs or journals, which are similar to social networking sites in that they often include considerable amounts of personal information and pictures, is not related to receiving aggressive sexual solicitation unless youths also interact online with unknown people. (117)
  • Boys constitute 25% of victims in Internet-initiated sex crimes, and virtually all of their offenders are male. (118
  • Some gay boys turn to the internet to find answers to questions about sexuality or meet potential romantic partners, and there they may encounter adults who exploit them. (118)
  • ..child molesters are, in reality, a diverse group that cannot be accurately characterized with one-dimensional labels. (118)
  • Online child molesters are generally not pedophiles. (118)Online child molesters are rarely violent. (119)
  • Child pornography production is also an aspect of Internet-initiated sex crimes. One in five online child molesters in the N-JOV Study took sexually suggestive or explicit photographs of victims or convinced victims to take such photographs of themselves or friends. (120)
  • Youths may be more willing to talk extensively and about more intimate matters with adults online than in face-to-face environments. (121
  • it may not be clear to many adolescents and adults that relationships between adults and underage adolescents are criminal. (122)
  • Simply urging parents and guardians to control, watch, or educate their children may not be effective in many situations. The adolescents who tend to be the victims of Internet-initiated sex crimes many not themselves be very receptive to the advice and supervision of parents. (122)
  • We recommend educating youths frankly about the dynamics of Internet-initiated and other nonforcible sex crimes. Youths need candid, direct discussions about seduction and how some adults deliberately evoke and then exploit the compelling feelings that sexual arousal can induce. (122)
    • anonymous
       
      Let's remember that although there are direct references to gay and male pedophiles of gay boys, that 99% of child sex offenders identify as heterosexual, online or offline.
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
  •  
    This research article has the facts about sexual predatory behavior.
Anne Bubnic

Social Media and Digital Citizenship - 2 views

  • Content filters, policies and guideline aren’t the final answer. If we are to have our students become true citizens we need to it though teaching.
Anne Bubnic

"Digital Citizenship" VoiceThread Albums Created by Kids - 2 views

  •  
    Students use Voice Thread to communicate their knowledge of digital citizenship topics. Particularly noteworthy is the project done by 8th graders entitled "Online Safety." Not only do they demonstrate knowledge of safety principles but they also set up opportunities for the global community to interact with them as they query their audience on their own cybersafety practices. Nobody has answered them yet, but think of the possibilities!
Anne Bubnic

Calculate your daily digital footprint [Tool] - 3 views

  •  
    This tool calculates the size of your daily digital footprint based on types, frequency and quantities of technology usage. Might make an interesting exercise for kids, paired with a lesson on personal identity online etc. Their answers might be quite different from adults.
Anne Bubnic

Students: Music Downloading - Answer the Question - 2 views

  •  
    One of eight interactive case studies for kids (GR 4-8) from Cable In the Classroom: Power to Learn.
    Educating students about the legal and ethical aspects of illegal downloading offers the best opportunity to minimize the ethics gap which allows otherwise law-abiding kids to break the rules. Case studies are explored. Students are asked to develop an essay question. The graphics are Nickelodeon style. For the entire series, check out: http://powertolearn.com/internet_smarts/interactive_case_studies/index.shtml
Anne Bubnic

Answers to Your Sexting Questions [Video] - 0 views

  •  
    Wednesday "Good Morning America" and Internet safety expert Parry Aftab of WiredSafety.com brought parents and kids together to discuss a new, possibly dangerous phenomenon called "sexting" -- teens sharing with friends sexually explicit images or messages via cell phones.
‹ Previous 21 - 40 of 47 Next ›
Showing 20 items per page