Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged at

Rss Feed Group items tagged

Anne Bubnic

Facebook, Take 2: Cyberbullying - 0 views

  • I also asked them why they allowed certain girls to be on their friends list when they know that some of them will resort to this type of bullying, and most said because they felt they “had to.” This kind of pressure to allow “friends” on one’s site could also be considered a form of bullying, as they feel there may be consequences to shutting some out regardless of their lack of Internet etiquette.
  • As a public school principal, I can’t legally discipline a student for cyberbullying actions that take place outside of school that don’t result in bodily harm at school. However, when cyberbullying that has taken place outside of school becomes a school issue, as it did today, we must reserve the right to take action if the effects of outside cyberbullying threaten the safety or well-being of the student(s) in school, even if it hasn’t caused bodily harm…yet.
  • School officials have the authority to impose discipline if the speech has, or there are particularized reasons to believe it will cause a substantial disruption at school or interference with the rights of students to be secure. Three types of situations generally meet this standard - violent altercations, hostile environment for a student, significant interference with instruction.
  •  
    Our Acceptable Use of the Internet policy next school year will definitely not only address cyberbullying, it will include a clause that states something to the effect, "If cyberbullying outside of school becomes an issue in which a student feels threatened or unsafe in any way at school, the principal has the authority to discipline the cyber bully." It will give the school community the clear message that cyberbullying will not be tolerated and at the very least will give me a little leverage when I need it.
Anne Bubnic

Internet Smarts - Interactive Case Studies - 0 views

  •  
    Explore important topics in Internet use at school or at home. These guided, multimedia activities allow you to examine issues affecting schoolwork, class papers, entertainment activities and online safety.
  •  
    Explore important topics in Internet use at school or at home. These guided, multimedia activities allow you to examine issues affecting schoolwork, class papers, entertainment activities and online safety.
Anne Bubnic

This Is Me: UK Digital Identity Project - 0 views

  • his Is Me project aims to look at ways of helping people to learn more about what makes up their Digital Identity (DI) and at ways of developing and enhancing it.  "Digital Identity" is made up of multiple parts - it isn't just what we have published about ourself on the web, but also includes things other people have published about us.
  •  
    This Is Me project aims to look at ways of helping people to learn more about what makes up their Digital Identity (DI) and at ways of developing and enhancing it. "Digital Identity" is made up of multiple parts - it isn't just what we have published about ourself on the web, but also includes things other people have published about us.
Anne Bubnic

My Pop Studio - 0 views

  •  
    My Pop Studio is a creative play experience that strengthens critical thinking skills about television, music, magazines and online media directed at girls. Users select from four behind-the-scenes opportunities to learn more about mass media: My Pop Studio strengthens media literacy skills, promotes positive youth development, and increases knowledge about health issues. Highly interactive creative play activities are used to create an online community that guides users through the process of deconstructing, analyzing and creating media. Video segments, flash animation, media deconstruction games and quizzes, and moderated blogs make the website lively, fun and educational. My Pop Studio was created by a team of researchers and media professionals at the Media Education Lab, located at Temple University's School of Communication.
Go Jobio

Don't Discuss Irrelevant Job Experiencesand Achievements - 0 views

  •  
    Employers at big corporations don't care if you dressed as Donald Duck in Disneyland for extra cash to pay off your tuition while going to college. You'd be better off saving that information for a fun conversation at your next company lunch meeting. However if you were the executive manager at a retail store, and are applying for a sales position, you can illustrate the people, organizational, and leadership skills that you acquired in your previous position.
realcounterfeits

Buy aed online - Buy fake 1000 dirhams- Real Counterfeits Money - 0 views

  •  
    Buy AED 1000 Online UAE Dirham banknotes were issued from the Central Bank of the United Arab Emirates, including this one thousand banknotes by Dirhams, in nine separate denominations. You belong to the new UAE Dirham series of banknotes. In 2000 these 1000 Dirham US banknotes were issued by the Central Bank of the United Arab Emirates. They are still in use at present. A sparrowhawk bird is on the UAE Bill of a thousand dirhams. The note 1000 UAE dirhams includes the words Central Bank of the United Arab Emirates The banknotes are sold at the lowest possible price for sale to minors. Companies such as Real Counterfeit Money give us the ability to use Emirati Dirham at the highest standard online at a very affordable price. This is better than staring at expensive cars of friends and worrying about whether or not we can afford to buy counterfeit money online. When you intend to purchase Emirati Dirham online, make sure you buy it through a reliable web services like Real Counterfeit Money. How safe are this falsified money online? The money generated by the Top Counter Money is entirely safe and secure. They are critically checked in the company's laboratories and then published for the common citizens. Guidelines and stringent protocols must be followed everywhere with fake banknotes. AED 1000 is available for sale in the online store and 100% safe online for purchasing AED 1000. Where to Buy AED 1000 Online There are a few websites that sell fake money online, but if you are a newbie, it is best for those fake money vendors to do careful research, because most of them are not so accurate. If you are not careful, you could lose your hard-earned money. Fortunately, you have a 100 % genuine direct manufacturer and retailer called Real Counterfeit Money, to help you begin your journey online in the world of fake money. Even after the distribution cycle, we have the best-quality AED 1000 for sale at the lowest affordable rates. buy aed online, fake 1000 dirham
realcounterfeits

United arab emirates dirham د.إ200 - Real Counterfeits Money - 0 views

  •  
    United arab emirates dirham د.إ200 - Buy AED 200 Online What's the easiest way to buy online AED 200? False Docky is the number one online tool for the best online purchase at a minimal rate. Recent patterns are the fake money online, with the average people buying all the joy they desired. Compared to other fake money suppliers, Real Counterfeit Money offers AED 200 for sale online almost at a negligible price. How Does Fake Money Need to Be Bought Online? We have found that the common people have a strong desire to buy what they can not afford in real time as these fake money suppliers make their lives more simple online by giving them the ability to conveniently buy all the desired items without having any issues, as these fake banknotes can not be detected by their naked eyes or by their senses. Is It Possible to Buy Aed 200 Online? Was Aed 200 Available for Sale? Yes, banknotes are available at the lowest possible price for sale to minors. Companies such as Real Counterfeit Money give us the ability to use Emirati Dirham at the highest standard online at a very affordable price. This is better than staring at expensive cars of friends and worrying about whether or not we can afford to buy counterfeit money online. If you plan to buy Emirates Dirham online, make sure you buy it from a trustworthy website like Real Counterfeit Money. Buy united arab emirates dirham د.إ200 How Safe Are These Falsified Money Online? The money produced by Real Counterfeit Money is totally safe and reliable. They are critically checked in the company's laboratories and then published for the common citizens. Guidelines and stringent protocols must be followed everywhere with fake banknotes. The online shop offers AED 200, and 100% healthy AED 200 is available for sale online. united arab emirates dirham د.إ200 buy aed online fake 1000 dirhams 1000 aed note aed 1000 aed bills uae 1000 dirham note uae dirham 1000 note fake 200 dirhams thousand dirham note
buyglobalshop

Buy Verified LiLi Accounts - Buy Global Shop - 0 views

  •  
    Have you listened almost LiLi accounts and pondered what they are all almost? Well, you're not alone! LiLi accounts, brief for Constrained Risk Venture accounts, are a sort of speculation item that offers a special combination of development potential and resource security for financial specialists. These accounts give a layer of assurance for financial specialists by constraining their risk in the case of monetary misfortunes, making them a well known choice among those looking to oversee chance whereas still looking for openings for development in their venture portfolios. Buy Verified LiLi Accounts What precisely is a LiLi account? Have you ever listened of a LiLi account and pondered what precisely it is? In today's advanced keeping money world, there are bounty of modern account choices accessible, and LiLi is one of them. A LiLi account, brief for "life-living," is a sort of money related item outlined to offer assistance people consistently oversee their cash and accomplish their individual money related objectives. But what sets a LiLi account separated from conventional checking or investment funds accounts? Let's take a closer see at what makes a LiLi account one of a kind and how it might advantage your monetary wellness. Buy Verified LiLi Accounts Unlike conventional accounts, a LiLi account ordinarily offers a combination of managing an account administrations and money related apparatuses all in one put. With a LiLi account, you can effectively track your investing, set reserve funds objectives, and indeed gain rewards for assembly certain money related turning points. Furthermore, a few LiLi accounts may offer competitive intrigued rates, permitting your cash to develop over time. Whether you're looking to spare for a enormous buy or fair need to way better oversee your day-to-day accounts, a LiLi account may be a profitable device in making a difference you reach your money related objectives. Remain tuned to learn more approximately th
Nicks Mor

Get creative web design, graphic, logo, brochure design services at affordable cost - 0 views

  •  
    At Radixweb, we are specialized in creative web design, graphic design, logo design, brochure design, banner design, illustration, identity creation at best price ever. Get affordable web design solutions from web Design Company based from India.
Anne Bubnic

Internet censorship plagues journalists at Olympics | News - Digital Media - CNET News.com - 0 views

  •  
    With the opening of the Beijing Olympic Games a mere 10 days away, members of the media have learned that there is at least one thing they can expect not to be open: the Internet. Despite earlier assurances that journalists would have unfettered access to the Internet at the Main Press Center and athletic venues, organizers are now backtracking, meaning that the some 5,000 reporters working in Beijing during the next several weeks won't have access to a multitude of sites such as Amnesty International or any site with Tibet in the address, according to an Associated Press report.
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • ...3 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Anne Bubnic

Cyber Bullying Presents a Complex Legal Landscape - 0 views

  • Cyber bullying conducted at school allows school authorities to more easily impose discipline. The use of school equipment to cyber bully also makes a stronger legal argument for action by the school. And if the student e-mails offensive speech to school or downloads it at school and then distributes it, the school is in an advantageous position regarding disciplining the student. However, speech created at home—such as the creation of a Web site—affords greater legal protection for cyber bullies.
  • “The problem with the approach that web speech created at home can—if accessed at school—become school speech that can be regulated is the very nature of the Internet. Once something is created and placed on the Internet, the author loses control over who can access the speech and where it can be accessed.”
  •  
    As students across the country return to school, school districts face an often complicated and confusing legal landscape on how to deal with cyber bullies in their schools, according to Todd DeMitchell, EdD, a professor of education, who studies school liability, adequate supervision, and responses to preventing bullying and cyber bullying from school administrators and state legislatures.
Grace Kat

What really puts kids at risk online? - 0 views

  •  
    Research suggests that it'snot giving out personal information that puts kid at risk. It's not having a blog or a personal website that does that either. What puts kids in danger is being willing to talk about sex online with\nstrangers or having a pattern of multiple risky activities on the web\nlike going to sex sites and chat rooms, meeting lots of people there,\nkind of behaving in what we call like an internet daredevil."
Jocelyn Chappell

Middle School Ed Tech Blog - 0 views

  • Join us live tomorrow night (Monday, April 14th) at 9:00 PM EDT as Parents as Partners is joined by special guest, Steve Hargadon, to discuss web2.0 pedagogies in schools and best practices for educating parents about these tools.
  •  
    Bumped in to this today -- would you belive in coincidences -- Parents as Partners at joined by Steve Hargadon tonight 14 April 9pm PDT (too late for GMT me) -- participate at chatroom http://edtechtalk.com/live -- to discuss web2.0 pedagogies in schools and best practices for educating parents -- I so wish I could stay up but will have to leave that for others (aka feedback request please) -- although thinking about it I might manage to get up early the following day (ouch).
Anne Bubnic

AT&T Smart Limits - 0 views

  •  
    AT&T Smart Limits™ brings together information about parental control features across AT&T's wireless, wired, broadband and video service. Includes tools in four areas: Wireless Smart, Surf Smart, Watch Smart and Talk Smart.
Anne Bubnic

Student Voices: Learning to Change/ Changing to Learn - 0 views

  •  
    The third PSA in a series created by Pearson Foundation and the Consortium for School Networking, focusing on the challenges and opportunities of integrating technology into teaching practice around the world. Students discuss the ways in which they use technology at school, at home, or in their everyday lives.
Anne Bubnic

Students: Social Networking: Don't Give Yourself Away - 3 views

  •  
    One of eight interactive case studies for kids (GR 4-8) from Cable In the Classroom: Power to Learn.
    It's very popular for young people to meet and connect online at sites like MySpace.com. However, an awareness of the risks and steps for being safe can ensure a positive experience with social networking. Don't give yourself away! This unit explores the concepts of identity, at-risk behaviors and safety online. The graphics are Nickelodeon style. A short quiz assesses learning. For the entire series, check out: http://powertolearn.com/internet_smarts/interactive_case_studies/index.shtml
Anne Bubnic

Pupils 'must manage online risks' - 2 views

  • The five schools judged outstanding for online safety all used managed systems to help pupils become responsible users of technology.
  •  
    Pupils given a greater degree of freedom to surf the internet at school are less vulnerable to online dangers in the long-term, inspectors say. "Managed" online systems were more successful than "locked" ones at safeguarding pupils' safety, they said. The inspectors' research was commissioned in response to a report by Dr Tanya Btron, which assessed the risks children faced when using the internet and video games.
Anne Bubnic

Cyber Bullying - School Policies? - 0 views

  • A punch in the eye seems so passé. Bullies these days are traveling in packs and using cyberspace to their humiliating messages online. Like the toughies of old, they are both boys and girls and they demand nothing less than total submission as the price of peace. It’s a jungle out there. For school districts, patrolling the hallways and adjacent grounds is just a start. In the 21st century, a new kind of vigilance is necessary—an expanded jurisdiction that serves to both stave off legal actions and ensure a safe and productive learning environment.
  • Today’s principals rely on district policy and practice to extend the presumed long arm of the law to off-campus incidents. Potentially, that could mean plunging headlong into the electronic frontier to rescue student victims and thwart cyberbullying classmates who thrive as faceless computer culprits.
  • A December 2009 study by Harvard University’s Berkman Center for Internet & Society found that students on the receiving end report greater emotional distress, are more likely to abuse substances, and are more frequently depressed.
  • ...8 more annotations...
  • The report concluded a child is more likely to face cyberbullying by fellow students than being stalked by an online predator. “Bullying and harassment are the most frequent threats minors face, both online and offline,” notes the Harvard report, Enhancing Child Safety & Online Technologies: Final Report of the Internet Safety Task Force to the Multistate Working Group on Social Networking of State Attorneys General of the United States.
  • Bullying can take a variety of forms. Incidents have included stealing passwords, impersonating the victim online, fake MySpace or Facebook pages, embarrassing photos or information being revealed, threats, rumors, and more. And, bullying tends to magnify the longer it exists.
  • Students sometimes will cyberbully teachers or other school employees
  • In January, a federal court in Connecticut ruled that Regional District 10 was within its rights to discipline a student over an off-campus blog. Judge Mark Kravitz rejected Avery Doninger’s claim that the school violated her free speech rights when they refused to let her serve as class secretary or to speak at graduation because of words she wrote at home
  • According to the Hartford Courant, the school district won “because the discipline involved participation in a voluntary extracurricular activity, because schools could punish vulgar, off-campus speech if it posed a reasonably foreseeable risk of coming onto school property, and because Doninger’s live journal post was vulgar, misleading, and created the risk of substantial disruption at school.”
  • In Florida, a high school senior and honor student was accused of cyberbullying after she wrote on Facebook: ‘’Ms. Sarah Phelps is the worst teacher I’ve ever met! To those select students who have had the displeasure of having Ms. Sarah Phelps, or simply knowing her and her insane antics: Here is the place to express your feelings of hatred.’’ Katherine Evans, who was suspended for “bullying and cyberbullying harassment toward a staff member,” sued the charter school in December 2008. A final ruling is pending.
  • In a 2007 incident, 19 students were suspended at a Catholic high school near Toronto for cyberbullying a principal on Facebook. The students called the principal a “Grinch of School Spirit” and made vulgar and derogatory comments. While the U.S. Constitution does not necessarily apply in private school settings, the incident demonstrates that this kind of behavior can happen anywhere.
  • Districts should have a cyberbullying policy that takes into account the school’s values as well as the school’s ability to legally link off-campus actions with what is happening or could happen at school.
  •  
    Good article from AMERICAN SCHOOL on the policies that schools need to have in place to protect both students and teachers from cyberbullies.
JOSEPH SAVIRIMUTHU

Cyber bullies run amok at top school - 0 views

  • PARENTS have been urged to confiscate their children's mobile phones at night and monitor computer use after two year 9 students from the prestigious Sydney girls' school Ascham were forced to leave the school because of cyber-bullying.
  •  
    Parents have been urged to confiscate their children's mobile phones at night and monitor computer use after two year 9 students from the prestigious Sydney girls' school Ascham were forced to leave the school because of cyber-bullying.
‹ Previous 21 - 40 of 637 Next › Last »
Showing 20 items per page