Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged behavior

Rss Feed Group items tagged

Anne Bubnic

ISTE Books | Raising a Digital Child - 0 views

  •  
    New book by Mike Ribble (Author of Digital Citizenship in the Schools). You want your children to enjoy all the benefits a technological society has to offer, but at the same time, you want them to stay safe and act as responsible members of society. Raising a Digital Child is your guide. Inside, you will learn about many of the newest and most popular technologies, in parent-friendly language, along with discussions of the risks each might harbor and the types of behaviors that every child should learn in order to become a good citizen in this new digital world.
Anne Bubnic

Teaching Teenagers About Harassment - 0 views

  •  
    This month, three teenage girls, students at Greensburg Salem High School in Greensburg, Pa., were charged with disseminating child pornography. They had sent nude pictures of themselves by cellphone to their teenage boyfriends, who were charged with possessing child pornography.\n\nThe legal consequences in this case may have been unique, but the behavior is not. About 20 percent of teenagers have posted or sent nude cellphone pictures of themselves, according to the National Campaign to Prevent Teen and Unplanned Pregnancy, a nonprofit group.
anonymous

Online Predators and Their Victims - 0 views

  • My (Liz B. Davis ) Summary of Key Points (All are quotes directly from the article): Online "Predators" and Their Victims. Myths, Realities, and Implications for Prevention and Treatment. by: Janis Wolak, David Finkelhor, and Kimberly J. Mitchell - University of New Hampshire and Michele L. Ybarra - Internet Solutions for Kids, Inc.
  • The publicity about online"predators" who prey on naive children using trickery and violence is largely inaccurate.
  • adult offenders who meet, develop relationships with, and openly seduce underage teenagers
  • ...21 more annotations...
  • In the great majority of cases, victims are aware they are conversing online with adults. In the N-JOV Study, only 5% of offenders pretended to be teens when they met potential victims online. (112)
  • Offenders rarely deceive victims about their sexual interests.
  • promises of love and romance
  • 99% of victims of Internet-initiated sex crimes in the N-JOV Study were 13 to 17 years old, and none were younger than 12. 48% were 13 or 14 years old. (115)
  • it was those 15-17 years of age who were most prone to take risks involving privacy and contact with unknown people. (115)
  • take place in isolation and secrecy, outside of oversight by peers, family  members, and others in the youth's face-to-face social networks (115)
  • Most of the online child molesters described in the N-JOV Study met their victims in chatrooms. In a 2006 study, about one third of youths who received online sexual solicitation had received them in chatrooms. (116)
  • Youth internet users with histories of offline sexual or physical abuse appear to be considerably more likely to receive online aggressive sexual solicitations. (117)
  • ..Although Internet safety advocates worry that posting personal information exposes youths to online molesters, we have not found empirical evidence that supports this concern. It is interactive behaviors, such as conversing online with unknown people about sex, that more clearly create risk. (117)
  • Online molesters do not appear to be stalking unsuspecting victims but rather continuing to seek youths who are susceptible to seduction. (117)
  • maintaining online blogs or journals, which are similar to social networking sites in that they often include considerable amounts of personal information and pictures, is not related to receiving aggressive sexual solicitation unless youths also interact online with unknown people. (117)
  • Boys constitute 25% of victims in Internet-initiated sex crimes, and virtually all of their offenders are male. (118
  • Some gay boys turn to the internet to find answers to questions about sexuality or meet potential romantic partners, and there they may encounter adults who exploit them. (118)
  • ..child molesters are, in reality, a diverse group that cannot be accurately characterized with one-dimensional labels. (118)
  • Online child molesters are generally not pedophiles. (118)Online child molesters are rarely violent. (119)
  • Child pornography production is also an aspect of Internet-initiated sex crimes. One in five online child molesters in the N-JOV Study took sexually suggestive or explicit photographs of victims or convinced victims to take such photographs of themselves or friends. (120)
  • Youths may be more willing to talk extensively and about more intimate matters with adults online than in face-to-face environments. (121
  • it may not be clear to many adolescents and adults that relationships between adults and underage adolescents are criminal. (122)
  • Simply urging parents and guardians to control, watch, or educate their children may not be effective in many situations. The adolescents who tend to be the victims of Internet-initiated sex crimes many not themselves be very receptive to the advice and supervision of parents. (122)
  • We recommend educating youths frankly about the dynamics of Internet-initiated and other nonforcible sex crimes. Youths need candid, direct discussions about seduction and how some adults deliberately evoke and then exploit the compelling feelings that sexual arousal can induce. (122)
    • anonymous
       
      Let's remember that although there are direct references to gay and male pedophiles of gay boys, that 99% of child sex offenders identify as heterosexual, online or offline.
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
  •  
    This research article has the facts about sexual predatory behavior.
Anne Bubnic

B4UCopy - 1 views

  •  
    From the Business Software Alliance (BSA.) Computers make it easy to make copies of computer software, pictures, words, movies and songs. But copyright laws make it illegal to copy the creative work without the owner's permission. Making copies of a work protected by copyright is just like stealing. The B4UCopy educational curriculum program, available for free download, has a goal of raising awareness of copyright laws and reinforce responsible behavior online.
Colette Cassinelli

Netsmartz: Real Life Stories [Video] - 0 views

  •  
    These powerful stories teach teens to examine their behavior and encourage them to be proactive in preventing victimization of themselves and others.Teens share their own "Real-Life Stories" about issues affecting them on the Internet such as cyberbullying, online enticement, and giving out too much personal information. At CTAP, we love these videos and frequently feature them in our workshops and trainings "Feathers in the Wind" and "You Can't Take It Back" are two of our favorites. "Amy's Choice" is also a compelling video clip.
Anne Bubnic

Teen Online & Wireless Safety Survey [PDF] - 0 views

  •  
    Cox Communications commissioned Harris Interactive to conduct a survey among U.S. teens ages 13-18. Key objectives of this study were to: *Examine teen's online and cell phone behavior, specifically regarding: * Sending sexually suggestive text messages ore emails * Bullying others online or by text message *Understand the relationship between teens and their parents regarding parental controls for the Internet *Uncover how and why teens go online on their cell phone
    Download the complete 60-page report.
Anne Bubnic

Cyber Ethics/C3 Matrix - 2 views

  •  
    Cyber-ethics is the discipline of using appropriate and ethical behaviors and acknowledging moral duties and obligations pertaining to online environments and digital media. Part of the C3 Matrix developed by IKeepSafe for Digital Citizenship Education
Anne Bubnic

Studies Reveal Why Kids Get Bullied and Rejected - 5 views

  •  
    "Kids who get bullied and snubbed by peers may be more likely to have problems in other parts of their lives, past studies have shown. And now researchers have found at least three factors in a child's behavior that can lead to social rejection. "
Anne Bubnic

Stephen Balkam: 21st Century Citizenship - 6 views

  •  
    We need to use what we've learned about social norms to align kids and ourselves with the positive examples of responsible behavior, rather than be transfixed and drawn towards the portrayals of the worst of the web. It may be true that one in five kids have been involved in sexting, but that means the vast majority exercise good judgment and make wise choices online. The social norms field is ripe with possibilities and guidance in how to foster good digital citizenship.
Anne Bubnic

Microsoft Online Safety: Practice Cyberethics - 1 views

  •  
    Based on common sense and good judgment, cyberethics also includes obeying laws that apply to online behavior. When you practice cyberethics, you are more likely to have a safer and enjoyable Internet experience.
Anne Bubnic

Online Lives, Offline Consequences: Professionalism, Information Ethics and Professiona... - 2 views

  • For educators, perhaps the most familiar ethical issue facing students is that of academic honesty. For today's Internet-savvy students, who have become accustomed to cutting and pasting information on the fly with little attention to citations, the opportunity to use "free" online information is often too tempting to refuse
  •  
    To ensure that students' behaviors do not jeopardize their future careers, educators must understand the online activities that present ethical and professional issues and make every effort to educate students about appropriate behavior and interactions in an online environment
Anne Bubnic

The LetsTalk.com Cell Phone Etiquette Guide - 1 views

  •  
    With the proliferation of cell phones in our society and the onslaught of new ways to use your cell phones, consumers are becoming increasingly confused about setting boundaries. We hope our guidelines will help people better avoid and recognize "cell phone faux-pas". The guidelines are based on comprehensive annual surveys on cell phone etiquette and behavior dating back to 2000.
Anne Bubnic

Online Reputation in a Connected World [pdf] - 1 views

  •  
    This research is creating a lot of buzz because it illustrates the importance of managing our online identity and those of students. Online behavior is increasingly seen as a moral compass connected to behaviors offline. Whether it is for a job application, friendship, dating, or other purposes, when people want to learn about someone, they turn to this ever-growing pool of information. Online reputation, therefore, plays an important role in personal and professional life and has become a significant factor in making hiring decisions.
Anne Bubnic

Norton ranks riskiest cities for cybercrime - 0 views

  • Symantec then rated each city using different categories, such as risky online behavior (defined as buying items online and accessing financial information) and the number of cybercrimes per capita.
  •  
    Among 50 U.S. cities studied for their vulnerability to cybercrime, Seattle came out on top as the riskiest place, followed by Boston, Washington, D.C., and San Francisco, according to the report "Norton's Top 10 Riskiest Online Cities," released Monday. Results are based on the number of attempted hacking attacks and infected systems.
Anne Bubnic

Is Cyber Bullying Illegal? - 2 views

  •  
    In the United States, there's no federal law against cyber bullying -- yet. A bill introduced to the House of Representatives last year would make it against the law to "transmit in interstate or foreign commerce any communication, with the intent to coerce, intimidate, harass, or cause substantial emotional distress to a person, using electronic means to support severe, repeated, and hostile behavior." Anyone found guilty of this crime could face a fine or a prison term of up to two years.
Anne Bubnic

Who would have thought that Microsoft Word could be so powerful? - 0 views

  •  
    This exercise on "friendship" could also be done as part of a digital citizenship class to get kids thinking about appropriate behaviors online.
Anne Bubnic

The Wireless Foundation - 0 views

  •  
    The GET WISE ABOUT WIRELESS program helps educate students about cell phone use and the responsible behaviors associated with using cell phones. GET WISE ABOUT WIRELESS is designed to encourage educators and families to help their students practice proper cell phone etiquette and safety behaviors. It also seeks to serve as a catalyst for discussions at home among family members about using wireless technology in their day-to-day lives.
Anne Bubnic

Domino's employees fired over YouTube videos - 0 views

  •  
    Yet another incident showing use and misuse of technology with no understanding of offline consequences for online behavior. This time, however, it occurs in the workplace and not at school.
Anne Bubnic

Bill would fund internet safety education - 0 views

  •  
    A federal lawmaker has introduced internet safety legislation that, if passed, would authorize roughly $175 million--$35 million a year for five years--for internet safety education and training to help make children, parents, and educators aware of proper online behavior and the dangers the internet poses.
Anne Bubnic

Digital Citizenship: Monitoring Technology Use & Abuse [pdf] - 0 views

  •  
    THE JOURNAL (arcticle) by Mike Ribble and Gerald Bailey. Provides a five-step program for creating a digital citizenship program in your school.Over the last two years, it has become evident that a behavior pattern of misuse and abuse with respect to technology is \nbeginning to emerge in our society. This outbreak of \ntechnology misuse and abuse is documented in continual news \ncoverage on TV, in newspapers and on the Internet - both \ninside and outside of schools. The endless list of misuse and \nabuse includes hacking into school servers, using e-mail to \nintimidate or threaten students, illegally downloading music, \nplagiarizing information from the Internet, using cellular \nphones during class time, accessing pornographic Web sites, \nand playing video games during class. Therefore, if you are \nusing technology in your district, you must begin to deal with \ndigital citizenship in a significant way. \n
« First ‹ Previous 41 - 60 of 100 Next › Last »
Showing 20 items per page