Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged blog

Rss Feed Group items tagged

Anne Bubnic

Digital Lifestyle Youth Culture Profile Report 2008 - 0 views

  • For example, miniDV cameras are not only among the new tools of self-expression, but the very act of creating personal videos with friends and creating events and key themes to shoot have become key aspects of entertainment in and of itself. To this generation, playing music via your cell phone, and movies and TV shows via your iPod are a given. Emailing is considered too old-school by many, whereas texting is outpacing cell phone calls. These things also go hand-in-hand with changes in online shopping patterns, top website preferences, communication and blogging patterns, and new habits for using social networks—not to mention the tremendous changes in preferred social networks and profile page usage patterns in general. These things are changing the paradigm of how the businesses of entertainment, communication, retail, marketing, advertising, and branding have been done in the past.
  • Unfortunately, as more companies pour big money into expanding their new media marketing components, as many people have discovered, the Field of Dreams theory (“if we build it, they will come”) certainly doesn’t apply when it comes to reaching savvy youth today. Popping up a site (or social network for that matter) no matter how cool it is means nothing if you can’t reach the market it’s intended for. This Report, therefore, also includes a great deal about how young people find out about new websites, communicate with others, and other forms of grassroots networking.
  • Overall, the Digital Lifestyle Youth Culture Profile Report 2008 not only reveals traits by target demographics, but also the growing generation gap occurring even within this generation.
  •  
    [Market Research Report]

    "Young people are the inherent trend leaders when it comes to new technology and usage patterns, and are the ones pushing forward the speed of change in communication and information technology. This Report reveals that it may be imperative for some brands to re-think strategies--even among progressive companies--if they are to reach youth culture effectively.
Anne Bubnic

Digital Natives »The Ballad of Zack McCune (Part III) - 0 views

  •  
    In April of last year, Zack McCune was sued by the RIAA. He ended up $3,000 lighter (he settled), but with a much richer understanding of the contemporary debate surrounding music, copyright law, and file sharing. Part I gives an intro to his story, while Part II explores the disconnect between young downloaders and the recording industry. Part III, presented here, concludes Zack's misadventure and examines where it led him: to the Free Culture Movement, which advocates more flexible intellectual property law.
Anne Bubnic

Leadership, Education & Etiquette - On or Offline [LEO] - 0 views

  • They are now developing a Web site to help educate their peers on the same issues and plan to visit elementary and middle school students this year to pass on Internet safety messages. Students also created individual blogs this week. "We're trying to develop youth to be leaders in the city and the state and the nation and the world. With the Internet, it's not just local," said Akua Goodrich, the program's director who helped found the Power Unit for Motivating Youth, an after-school and mentoring program in the city. "We have to prepare them to be safe and help spread the message."
  • "When you're a kid, you don't want to listen to an adult who doesn't know what you're going through," she said. "You're much more open to listen to your peers talk to you. It's more interesting."
  •  
    The Leadership, Education and Etiquette - On and Offline, or [Leo ] Student Leadership Training Project ended Friday with a debriefing and motivational words by the program's adult leaders. It wrapped up four days of training in which the 26 teens learned about cyber safety and social networking issues as well as peer-to-peer marketing and career preparations.
Anne Bubnic

Protecting Your Online Identity and Reputation - 0 views

  • Remember that nothing is temporary online. The virtual world is full of opportunities to interact and share with people around the world. It's also a place where nothing is temporary and there are no "take-backs." A lot of what you do and say online can be retrieved online even if you delete it — and it's a breeze for others to copy, save, and forward your information.
  • Mark your profiles as private. Anyone who accesses your profile on a social networking site can copy or screen-capture information and photos that you may not want the world to see. Don't rely on the site's default settings. Read each site's instructions or guidelines to make sure you're doing everything you can to keep your material private.
  • Safeguard your passwords and change them frequently. If someone logs on to a site and pretends to be you, they can trash your identity. Pick passwords that no one will guess (don't use your favorite band or your dog's birthday; try thinking of two utterly random nouns and mixing in a random number), and change them often. Never share them with anyone other than your parents or a trusted adult. Not even your best friend, boyfriend, or girlfriend should know your private passwords!
  • ...6 more annotations...
  • Don't post inappropriate or sexually provocative pictures or comments. Things that seem funny or cool to you right now might not seem so cool years from now — or when a teacher, admissions officer, or potential employer sees them. A good rule of thumb is: if you'd feel weird if your grandmother, coach, or best friend's parents saw it, it's probably not a good thing to post. Even if it's on a private page, it could be hacked or copied and forwarded.
  • Don't respond to inappropriate requests. Research shows that a high percentage of teens receive inappropriate messages and solicitations when they're online. These can be scary, strange, and even embarrassing. If you feel harassed by a stranger or a friend online, tell an adult you trust immediately. It is never a good idea to respond. Responding is only likely to make things worse, and might result in you saying something you wish you hadn't.
  • Take a breather to avoid "flaming." File this one under "nothing's temporary online": If you get the urge to fire off an angry IM or comment on a message board or blog, it's a good idea to wait a few minutes, calm down, and remember that the comments may stay up (with your screen name right there) long after you've regained your temper and maybe changed your mind.
  • Learn about copyrights. It's a good idea to learn about copyright laws and make sure you don't post, share, or distribute copyrighted images, songs, or files. Sure, you want to share them, but you don't want to accidentally do anything illegal that can come back to haunt you later.
  • Check yourself. Chances are, you've already checked your "digital footprint" — nearly half of all online users do. Try typing your screen name or email address into a search engine and see what comes up. That's one way to get a sense of what others see as your online identity.
  • Take it offline. In general, if you have questions about the trail you're leaving online, don't be afraid to ask a trusted adult. Sure, you might know more about the online world than a lot of adults do, but they have life experience that can help.
  •  
    Advice for teens from www.kidshealth.org. Here are some things to consider to safeguard your online identity and reputation:
    1. Remember that nothing is temporary online
    2. Mark your profile as private.
    3. Safeguard your passwords and change them regularly.
    4. Don't post inappropriate or sexually provocative pictures or comments.
    5. Don't respond to inappropriate requests
    6. Take a breather to avoid "flaming."
    7. Learn about copyrights.
    8. Check your digital footprint.
    9. Take it offline.
Anne Bubnic

How online predators target children - 0 views

  •  
    One of the most dangerous, insidious aspects of the Internet is the targeting of children by online sexual predators. These criminals employ a series of clever, manipulative tactics to reach out to children in an effort to get them to meet in person. Any parent with children who use the Internet should be aware of the strategies employed by online predators.
Anne Bubnic

10 ways parents can help stop cyberbullying - 0 views

  •  
    Every day, for kids of all ages, the problem of cyberbullying grows. The more time kids spend online, and the more net-savvy they become, the greater the odds are that they will become the target of other children who seek to hurt or embarrass them online.\n\nThe following are ten simple tips for keeping your kids safe online, and out of the hands of cyberbullies at school and from around the world.
Anne Bubnic

Public Humiiation or Net Safety Ed? - 0 views

  •  
    Anne Collier recounts the saga of the Windsor High School teen who was recently singled out at a school assembly meant to warn students about the dangers of providing too much personal profile information on MySpace. She asks us for input on whether we think this is effective cybersafety training - or a form of public humiliation.
Anne Bubnic

Cybersafety Assembly causes controversy on first day of high school - 0 views

  • John Gay, a police officer for the Cheyenne Police Department in Wyoming, volunteered at the request of Windsor High School principal Rick Porter to speak to students at two assemblies about the dangers of predators surfing social networking Web sites such as MySpace and Facebook.Gay shared how he could pull pictures off of Windsor High School students who had their own MySpace and Facebook pages. Nordic’s daughter, Shaylah, was one of the students Gay singled out to the point where Shaylah left the auditorium in tears.
  • Shaylah said Gay showed the other students her phone number, read her blogs and comments out loud.
  • He kept on picking at her and picking at her and picking at her and everyone said, ‘That’s harassment,’ ” Weakland said.
  • ...2 more annotations...
  • “Officer Gay chose it as an opportunity to take Shaylah’s pictures and her MySpace and use it as an example of what not to do, but then just really publicly humiliate her and mocked her,” said Nordic, who coaches wrestling at the high school and football and track at Windsor Middle School. “She left the auditorium in tears and busted out crying. He told the student body that he took her information from MySpace and showed it to a predator in prison and asked him what he would do with it.”
  • “You could imagine her sitting there and hearing that,” Nordic said. “He asked everybody there, ‘Is Shaylah Nordic here?’ So she raised her hand and then he went on to post the pictures and talk about it. He said she was likely to be raped and murdered because how easy it was to access this stuff, and how easy it was to get information.”
  •  
    Ty Nordic understands the need to inform kids about the dangers of sexual predators on the Internet. But when his 16-year-old daughter was targeted during an assembly at Windsor High School on the first day of school Tuesday afternoon, Nordic was left with plenty of unanswered questions for the presenter whom he said used inappropriate language during the assembly and singled out specific students.
Anne Bubnic

Twitter and Plurk: What Parents Should Know - 0 views

  • While there is nothing inherently dangerous in the sites themselves, there is the risk that teens could use microblogs to reveal personal information or engage in a relationship with someone whose intentions are less than honorable. And like any other form of communication, the door is open for a teen to take risks such as talking about sex with strangers (albeit in relatively short bursts) or getting together with someone they meet through a microblog.
  •  
    Services like Twitter and Plurk let people post very short messages (140 characters or less) to their friends and acquaintances. Founded in 2006, Twitter has attracted millions of users who keep people posted about what they're doing and thinking. It can be as simple as "I'm standing in line at the grocery store" to as profound as a quick comment about a political candidate, a world event or a new book. There's even a video spin-off of this concept called 12 Seconds that allows people to post video clips no longer than 12 seconds.
Anne Bubnic

Thx 4 the gr8 intrvu! - 0 views

  • Hiring managers like Johnson say an increasing number of job hunters are just too casual when it comes to communicating about career opportunities in cyberspace and on mobile devices. Thank-yous on paper aren't necessary, but some applicants are writing e-mails that contain shorthand language and decorative symbols, while others are sending hasty and poorly thought-out messages to and from mobile devices. Job hunters are also using social-networking sites like Facebook and MySpace to try to befriend less-than-willing interviewers.
  •  
    After interviewing a college student in June, Tory Johnson thought she had found the qualified and enthusiastic intern she craved for her small recruiting firm. Then she received the candidate's thank-you note, laced with words like "hiya" and "thanx," along with three exclamation points and a smiley-face emoticon. "That e-mail just ruined it for me," says Johnson, president of New York-based Women For Hire Inc. "This looks like a text message."
Anne Bubnic

Nonprofit Distributes File Sharing Propaganda to 50,000 U.S. Students - 0 views

  • But the story line here is a miscarriage of justice at best -- even erroneously describing file sharing as a city crime punishable by up to two years in prison.
  • The purpose is basically to educate kids -- middle school and high school-aged about how the justice system operates and about what really goes on in the courtroom as opposed to what you see on television," said Lorri Montgomery, the center's communications director.
  • The piracy story has two plots. One is of the file sharer's grandmother fighting eminent domain proceedings to keep her house while Megan the criminal file sharer deals with the charges against her
  • ...1 more annotation...
  • The story is simple: Megan learns to download music from a friend. About 2,000 downloads and three months later, a police officer from the fictitious City of Arbor knocks on her door and hands her a criminal summons to appear in court.
  •  
    "The Case of Internet Piracy" was developed by judges and professors to teach students about the law and the courtroom experience.
Anne Bubnic

Digital Natives and the Myth of Multi-Tasking - 0 views

  • Dave Crenshaw discussed his latest book, The Myth of Multitasking. Crenshaw makes a strong distinction behind “background tasking”—reading a magazine while waiting in line, for instance, or listening to music while coding—and “switch-tasking.” Most of the time, when we talk about “multi-tasking,” we’re actually talking about the very costly practice of “switch-tasking.” Every time you switch your attention from one place to another—even from one browser window to another—you take a significant hit to your focus
  • Switch-tasking, he definitively proves, causes you to execute each task more slowly than you would otherwise, with more errors
  • pecifically, what can parents, teachers, and employers do to help their kids, students, and employees focus their attention more effectively? As a kid, student, and employee myself, I have to say that I believe the solution is emphatically not to limit access—at least not for older teens. Rather, I think the key lies in laying out the facts and discussing strategies. Information overload and the allure of infinite access, after all, are challenges that affect everyone with an internet connection—not just young people. And, though writing a stellar book report might not be a cause compelling enough to warrant total focus, every young person will at some point find a pursuit worth paying attention to. Maybe it’s writing short stories; maybe writing music. Maybe it’s making art. But when that pursuit comes along, they’re going to want to know how to firewall their attention, focus their efforts, and—for once—stop switching.
  •  
    What ever happened to old-fashioned "discipline?" This question has come up constantly in my conversations with parents and teachers over the course of my involvement with the Digital Natives project. When parents glance over and see not only 50 browser tabs open on the family computer, but iTunes and a computer game and AIM too-with a book report relegated to a tiny corner of the screen-they're understandably bewildered. How do kids ever get anything done? "I'm just really good at multi-tasking, Mom," a savvy student might reply. And, as long as the work gets done, it seems hard to argue with that logic.
Anne Bubnic

Cyber Bullying: Responsibilities and Solutions - 0 views

  •  
    The use of filtering or blocking software to prevent teens from accessing social networking Web sites is another approach that schools and parents can utilize. The disadvantage with blocking software is that teens eventually find a way to circumvent the blocking software. "Given the propensity for youth to constantly update language by the use of new words and phrases and alterations to the meaning of existing words and phrases, it would appear a difficult task to keep filtering software fully updated."
Anne Bubnic

Cyber Bullying Presents a Complex Legal Landscape - 0 views

  • Cyber bullying conducted at school allows school authorities to more easily impose discipline. The use of school equipment to cyber bully also makes a stronger legal argument for action by the school. And if the student e-mails offensive speech to school or downloads it at school and then distributes it, the school is in an advantageous position regarding disciplining the student. However, speech created at home—such as the creation of a Web site—affords greater legal protection for cyber bullies.
  • “The problem with the approach that web speech created at home can—if accessed at school—become school speech that can be regulated is the very nature of the Internet. Once something is created and placed on the Internet, the author loses control over who can access the speech and where it can be accessed.”
  •  
    As students across the country return to school, school districts face an often complicated and confusing legal landscape on how to deal with cyber bullies in their schools, according to Todd DeMitchell, EdD, a professor of education, who studies school liability, adequate supervision, and responses to preventing bullying and cyber bullying from school administrators and state legislatures.
Anne Bubnic

Digital Natives » The Ballad of Zack McCune, Part 2 [Video] - 0 views

  •  
    Second installment of a three-part video "The Ballad of Zack McCune" from Berkman Center for Internet & Society.
    What do you do when you're sued by the recording industry? And how do kids and teens reconcile the law (and corporate interests) with a culture of illegal downloading? Last year, Brown University student Zack McCune was faced with both of these questions.
Anne Bubnic

Digital Natives » The Ballad of Zack McCune, Part 1 [Video] - 0 views

  •  
    First installment of a three-part video "The Ballad of Zack McCune." from Berkman Center for Internet & Society.
    Zack McCune's story - how he got sued by the Recording Industry Association of America and what happened as a result.
Anne Bubnic

Humiliation and gossip are weapons of the cyberbully - 0 views

  • ead teachers are being advised to draw up new rules on mobile phone use amid a growing number of cases of what is now known as “cyber-bullying”. In many secondary schools, over 90% of bullying cases are through text messages or internet chatrooms. It is hoped that the rules about mobile phone use will protect children from abusive texts, stop phones going off in class and prevent mobiles being taken into exam halls.
  • Although the majority of kids who are harassed online aren’t physically bothered in person, the cyber-bully still takes a heavy emotional toll on his or her victims. Kids who are targeted online are more likely to get a detention or be suspended, skip school and experience emotional distress, the medical journal reports. Teenagers who receive rude or nasty comments via text messages are six times more likely to say they feel unsafe at school.
  • The problem is that bullying is still perceived by many educators and parents as a problem that involves physical contact. Most enforcement efforts focus on bullying in school classrooms, corridors and toilets. But given that 80% of adolescents use mobile phones or computers, “social interactions have increasingly moved from personal contact at school to virtual contact in the chatroom,'’ write Kirk R. Williams and Nancy G. Guerra, co-authors of one of the journal reports. “Internet bullying has emerged as a new and growing form of social cruelty.'’
  • ...1 more annotation...
  • Cyber-bullying tactics include humiliation, destructive messages, gossip, slander and other “virtual taunts” communicated through e-mail, instant messaging, chatrooms and blogs. The problem, of course, is what to do about it. While most schools do not allow pupils to use their mobiles in the school building, an outright ban is deemed unworkable. Advances in technology are throwing up new problems for teachers to deal with. Children use their phones to listen to music, tell the time or as a calculator. Cyber-bullies sometimes disclose victims' personal data on websites or forums, or may even attempt to assume the identity of their victim for the purpose of publishing material in their name that defames them or exposes them to ridicule.
  •  
    As more and more people have access to computers and mobile phones, a new risk to youngsters has begun to emerge. Electronic aggression, in the form of threatening text messages and the spread of online rumours on social networking sites, is a growing concern.
Anne Bubnic

HSTE Project » Digital Citizenship - 0 views

  •  
    Digital Citizenship Course: The purpose of this Wikispace is to explore the "Right Way" and "Wrong Way" to use the internet, blogs, wikis, email and Social Networking websites. Many students use the internet to communicate with their friends. Popular sites such as Facebook or Myspace are used by many students on a daily basis. The majority of students also have cell phones and text message or instant message (IM) their friends. So the question is this: Do you know how properly use technology and Social Networking tools safely and effectively?\n
Anne Bubnic

How I Learned to Type - 0 views

  •  
    "How I Learned to Type," was created by Diana Kimball and Sarah Zhang of the Digital Natives team. It takes a glance into how people of different ages learned one of the first skills every digital inhabitant needs - typing. Do you "peck" with two fingers, type in multiple languages at once, or have a typing teacher with a wooden leg? The people in "How I Learned to Type" do all this and more. Digital technology has become so ingrained in our lives that for digital natives, learning to type has become a ubiquitous experience, as memorable, say, as learning to read or ride a bike.
« First ‹ Previous 161 - 180 of 303 Next › Last »
Showing 20 items per page