Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged by

Rss Feed Group items tagged

Anne Bubnic

Cybercrime Resources and Tips [Symantec Corp] - 0 views

  •  
    The threat landscape once dominated by the worms and viruses unleashed by irresponsible hackers is now ruled by a new breed of cybercriminals. Cybercrime is motivated by fraud, typified by the bogus emails sent by "phishers" that aim to steal personal information. The tools driving their attacks and fueling the blackmarket are crimeware - bots, Trojan horses, and spyware.
Anne Bubnic

California Assembly Bill 86 - 0 views

  •  
    Existing law, the Interagency School Safety Demonstration Act of 1985, states that the intent of the Legislature in enacting its provisions is to encourage school districts, county offices of education, law enforcement agencies, and agencies serving youth to develop and implement interagency strategies, in-service training programs, and activities that will, among other things, reduce school crime and violence, including bullying. Existing law establishes the School/Law Enforcement Partnership and charges it with undertaking several efforts intended to reduce school crime, as specified,including bullying.

    This bill would specify that bullying, as used in these provisions,means one or more acts by a pupil or a group of pupils directed against another pupil that constitutes sexual harassment, hate violence, or severe or pervasive intentional harassment, threats, or intimidation that is disruptive, causes disorder, and invades the rights of others by creating an intimidating or hostile educational environment, and includes\nacts that are committed personally or by means of an electronic act, as defined.

    Existing law prohibits the suspension, or recommendation for expulsion, of a pupil from school unless the principal determines that the pupil has committed any of various specified acts, including, but not limited to, hazing, as defined. This bill, in addition, would give school officials grounds to suspend a pupil or recommend a pupil for expulsion for bullying, including, but not limited to, bullying by electronic act.

Anne Bubnic

FactCheckED.org - 0 views

  •  
    The Internet can be a rich and valuable source of information - and an even richer source of misinformation. Sorting out the valuable claims from the worthless ones is tricky, since at first glance a Web site written by an expert can look a lot like one written by your next-door neighbor. This lesson offers students background and practice in determining authority on the Internet - how to tell whether an author has expertise or not, and whether you're getting the straight story.
  •  
    The Internet can be a rich and valuable source of information - and an even richer source of misinformation. Sorting out the valuable claims from the worthless ones is tricky, since at first glance a Web site written by an expert can look a lot like one written by your next-door neighbor. This lesson offers students background and practice in determining authority on the Internet - how to tell whether an author has expertise or not, and whether you're getting the straight story.
  •  
    The Internet can be a rich and valuable source of information - and an even richer source of misinformation. Sorting out the valuable claims from the worthless ones is tricky, since at first glance a Web site written by an expert can look a lot like one written by your next-door neighbor. This lesson offers students background and practice in determining authority on the Internet - how to tell whether an author has expertise or not, and whether you're getting the straight story.
JOSEPH SAVIRIMUTHU

Cybersmart Detectives [Game] - 0 views

  • Cybersmart Detectives is an innovative online game that teaches children key internet safety messages in a safe environment. Children work online in real time liaising with community professionals to solve an internet-themed problem. The activity is based in the school environment, and brings together a number of agencies with an interest in promoting online safety for young people, including State and Federal Police, internet industry representatives and child welfare advocates. In the scenario, children play the role of a school Deputy Principal concerned about the welfare of a new student, who may be being bullied by someone they have met in an internet chat room. Guided by a series of clues, children work collaboratively in teams to solve the mystery of what is worrying the student, and why. 'Cybersmart Guides' respond to the questions and theories posed by the students, and guide the teams through each of the 'clues'. As the scenario unfolds, the children discuss the risks of certain online and offline behaviours, and ways of managing those risks. Although the scenario presented in the activity is simulated, the sense of urgency that excites a class of children taking part is very real. By the end of the activity children will have learned some valuable lessons about some of the risks associated with internet use, especially useful tips for chatting safely online. More importantly, the issues that lie behind the story will have been discussed with professionals who deal with similar issues on a daily basis. Cybersmart Detectives was initially developed by UK-based child advocacy agency Childnet International, and until 2005, operated under the name of Net Detectives. The activity is now independently operated by E-ngagelive. The Australian Communications and Media Authority ( ACMA ), by agreement with E-ngagelive , has adapted the activity for use in Australian schools under the name Cybersmart Detectives.
  •  
    Another example of emerging norms focussed on empowerment of children, this game is played online and accessible only to students in the United Kingdom.
Judy Echeandia

Summer guide to cybersafety - 0 views

  • Today's child has a digital footprint the size of bigfoot (especially compared to us) and their online life is just as important to them as their "real" life.  How do we keep our children safe in this brave new world?  By educating them how to make the right decisions online and by modeling appropriate behavior on the internet.  Yes that means we need to exist in the virtual world so we can see, hear, and participate in the main street of the 21st century.
  •  
    "Today's child has a digital footprint the size of bigfoot (especially compared to us) and their online life is just as important to them as their "real" life. How do we keep our children safe in this brave new world? By educating them how to make the right decisions online and by modeling appropriate behavior on the internet. Yes that means we need to exist in the virtual world so we can see, hear, and participate in the main street of the 21st century."
Anne Bubnic

Should schools teach Facebook? - 0 views

  •  
    FACEBOOK, MySpace, YouTube and Wikipedia are considered valuable educational tools by some who embrace the learning potential of the internet; they are also seen as a massive distraction with no academic benefit by others. Research in Nottingham and Notts suggests split opinions over the internet in the classroom. Some 1,500 interviews with teachers, parents and students nationwide showed the 'net was an integral part of children's personal lives, with 57% of 13 to 18-year-olds in Notts using blogs in their spare time and 58% in Nottingham. More than 60% of Nottingham teens use social networking sites. They are a big feature of leisure time - but now the science version of You Tube, developed by academics at The University of Nottingham, has been honoured in the US this week. The showcase of science videos shares the work of engineers and students online. However just a quarter of teachers use social networking tools in the classroom and their teaching, preferring to leave children to investigate outside school.
Anne Bubnic

California's 'digital divide' persists - [Survey Report] - 0 views

  • Slightly less than half of Latinos surveyed have home computers, compared to rates of 79 percent and above among black, Asian and white Californians, the survey found. While computer usage by blacks and whites in California has increased, there's been a decline in computer usage by Latinos and Asians, though Asian use remains much higher than that of Latinos. The drop appears to be correlated with income, with a sharp divide in computer usage between those making less than $40,000 and those making more.
  • Only 48 percent of Latinos have home computers compared with 86 percent of whites, 84 percent of Asians and 79 percent of blacks Californians, the institute reported.
  • But Asians and Latinos have seen declines in use of computers. Latinos' computer use has declined from 64 percent to 58 percent since 2000, while Internet use remained unchanged. Asians' use of computers was much higher, but also declined from 91 percent to 81 percent; Internet use went from 84 percent to 80 percent. Only 48 percent of Latinos have home computers compared with 86 percent of whites, 84 percent of Asians and 79 percent of blacks Californians, the institute reported.
  •  
    The use of computers and the Internet by Latinos and low-income Californians continues to lag behind other groups, according to a survey released Thursday by the Public Policy Institute of California.
Anne Bubnic

2007 Junior Achievement/Deloitte Teen Ethics Survey | - 0 views

  •  
    In alarming numbers, teenagers who think they are fully prepared to make ethical decisions are also driven by the pursuit of success to cheat, by time constraints to plagiarize, and by vengeance to inflict physical violence. This paints a disturbing picture for employers who will be relying on this age group to fill the pipeline in their future workforces. The fifth annual JA/Deloitte Teen Ethics Survey found that while most teens (71 percent) feel fully prepared to make ethical decisions in the workplace, nearly 40 percent of those young people believe that lying, cheating, plagiarizing, and violence are sometimes necessary to succeed in school. Download the attached Executive Summary and survey results documents to learn more.
Anne Bubnic

From MySpace to Hip Hop: New Media in the EveryDay Lives of Youth - 0 views

  •  
    On April 23, 2008, public forum, "From MySpace to Hip Hop: New Media In the Everyday Lives of Youth," reported on the interim findings of the ethnographic project funded by the MacArthur Foundation, "Kids' Informal Learning through Digital Media," conducted by researchers at the University of California, Berkeley and the University of Southern California. This event addressed how digital technologies and new media are changing the way that young people learn, play, socialize and participate in civic life. The forum was presented by Common Sense Media, the MacArthur Foundation and the Stanford University School of Education.
Anne Bubnic

Learning Cyberlaw in Cyberspace - 0 views

  •  
    This site provides reading materials for students studying the law as it applies to activities in cyberspace. The reading materials include edited cases, statutes, treaties, and law review articles, as well as content written by the individual module authors. Some have likened the study of cyberspace law to trying to board a moving bus. Given the pace of change in this field any attempt at a traditional casebook would largely be outdated before it reached the hands of the students. This site is designed to take advantage of the hypertext media offered by the world wide web by providing reading modules that can be altered or replaced as the law changes.
Anne Bubnic

YPulse [Anastasia Goodstein] - 0 views

  •  
    Ypulse is a media platform for youth media and marketing professionals, founded in May of 2004 by journalist Anastasia Goodstein. It provides news, commentary and resources about commercial media for teens (teen magazines, websites), entertainment for teens (movies, video games, television, music, books), technology used by teens (cell phones, instant messaging, hardware and software), the news media's desire to attract teens (newspapers, cable news), marketing and advertising (targeting the teen market) and non-profit youth media (highlighting organizations' efforts at promoting youth voices in media and creating media by and for youth). Anastasia is also the author of Totally Wired: What Teens and Tweens are Really Doing on Line.

JOSEPH SAVIRIMUTHU

Lawmakers Put Stop To 'Cyberstalking' - 0 views

  • “This cyber-safety bill is a critical step toward protecting Kentuckians from the very real threats that come with 21st century innovations and toward helping to prevent further abuses of these technologies,” said Beshear. “Kentucky families will be safer because of this bill.”HB 315, which was authored by Conway and primarily sponsored by Bell, makes it a Class D felony to solicit a minor for sexual activity through electronic communication. Through this legislation it is unlawful to “cyberstalk,” which is defined as intentionally alarming, annoying, intimidating or harassing a person with no legitimate purpose through electronic communication. This bill also includes tougher regulations for sex offenders when they use electronic communication.
  •  
    HB 315, which was authored by Kentucky Attorney General Jack Conway and primarily sponsored by Bell, makes it a Class D felony to solicit a minor for sexual activity through electronic communication.
adrinawinslet

15 Smart eCommerce Personalization Examples That Boost Sales - 0 views

  •  
    eCommerce personalization means showing individualized offers, product recommendations, and other content to your visitors based on their previous actions, demographics, and other personal data. Now, here are some examples of personalized marketing in eCommerce: 1. Deliver Weather-Sensitive Personalization 2. Adjust Navigation to Visitors' Interests 3. Recommend Product Categories Based on Browsing Behavior 4. Personalize Search Results 5. Send Personalized Email Based on User Behavior 6. Use Geo-Location Targeting 7. Show Category-Specific Discount Coupons 8. Sort Recent Products by Interest Level 9. Suggest Complementary Products 10.Pitch an Upsell at and after the Purchase 11. Remind Shoppers of Previous Engagements 12. Use a Style Finder 13. Show Product Recommendations Below the Product 14. Personalize the Homepage Banner by Category 15. Show Personalized Offers to Returning Visitors eCommerce Personalization has taken the world by storm. For all the small and medium players out there, it is no longer a luxury that can be overlooked. With a plethora of e-commerce personalization tools making their way to the market, personalization is going to become an important element in the sales strategy for a large number of ecommerce businesses. For More Information Visit: http://bit.ly/2MskkLd
adrinawinslet

10 Simple Steps will Make Your Hashtag Strategy Better - 0 views

  •  
    A keyword phrase which is spelled without spaces and preceded by a # sign is known as a hashtag. Hashtags originally got famous by Twitter and now they are used in almost all the social networking platforms like Facebook, Instagram, Pinterest, Twitter. Hashtags are important for social media. It began with Twitter and spread to other platforms. This guide will tell you how to use hashtags in social media marketing and how it will help you to get found by your target audience. Here, we will look into various effective ways to get the most out of hashtag strategy - - Hashtag Based on Social Media Platform - Number of Hashtags in a Post - Be Specific in Hashtags - Understanding Marketing Strategy - Finding a Relevant Trending Topic - Live Tweet - Create a Simple and Catchy Hashtag - Involving Audience in Hashtag Posts - Selecting the Right Time - Create to Inspire You might have seen hashtags on various social media platforms. Whenever someone clicks on the hashtag, they are directed to all the other posts containing the same hashtag. If someone searches for the word used in your hashtag, your post would get listed which means grabbing the attention of several social media users.
yc c

Jigsaw - 0 views

  •  
    Most of the world lives in countries that censor the internet. uProxy, seeded by Jigsaw and owned by the University of Washington, provides people access to the free and open internet by letting anyone who lives in a repressive society share the connection of someone who lives in a country with open internet access. uProxy works on an internet browser, with the option to set up a cloud server to provide constant access to the open internet. Perspective is an API that uses machine learning to spot abuse and harassment online.
Anne Bubnic

Some See Risks in Youngsters Creating Blogs - 0 views

  • On her blog, 12-year-old Tavi Gevinson posts photos of herself wielding a toilet plunger, posing in a room covered with newsprint and wearing a paint-splattered tutu inspired by Dolce & Gabbana's spring 2008 collection. She's part of a young generation of fashion bloggers who display their outfits for all to see. "Well I am new here," she wrote March 31 in her first post at Style Rookie. "Lately I've been really interested in fashion, and I like to make binders and slideshows of 'high-fashion' modeling and designs."
  •  
    Unlike a typical social network page, a blog can be seen by anyone and at least one young fashion blogger says she's been recognized by strangers on the street - a worrisome turn for adults worried about privacy and predators. For the bloggers, it's a chance to keep track of their obsession, with input from friends or other fashion fans.
Anne Bubnic

Terror in the Classroom: What Can be Done?, Part 4 - 0 views

  • A survey conducted by MSN United Kingdom found that 74% of teens as compared to 80% in this study did not go to anyone for advice when they were cyberbullied (www.msn.co.uk/cyberbullying, 2006). One reason some teenagers are reluctant to tell parents or adults is the fear of retaliation.
  • Many times parents don't get involved because they are afraid of invading their teen's privacy. Others may feel that as long as they have filtering software their teen is protected from negative material.
  • Parents need to be educated about cyberbullying- what it looks like, what the effects are and how to handle it. Rosalind Wiseman, educator and author of the best seller "Queen Bees & Wannabes", suggest parents consider the following: Use technology as an opportunity to reinforce your family values. Attach rules and consequences if inappropriate behavior occurs. Move the computer out of your child's bedroom and into the family room. Teach your child not to share passwords. Install monitoring and filtering software. Monitor your child's screen name(s) and Web sites for inappropriate content. If cyberbullying occurs, save and print out any evidence and decide whom you should contact for assistance.
  • ...1 more annotation...
  • n Tinker v. Des Moines Independent Community School District, 393 U.S. 503 (1969). The court ruled that a student's right to free speech can be limited when the speech "materially disrupts class work or involves substantial disorder or invasion of the rights of others." The standard of "material disruption" set by Tinker is often referred to by the courts
  •  
    What Can Parents Do? Schools should start addressing students, parents and staff about the issues of cyberbullying. Students need to be reminded that what they do in cyberspace is not really anonymous. They need to know their behaviors and words are downloadable, printable and sometimes punishable by law. The courts have given some direction for schools dealing with cyberbullying. "School districts are well within their legal rights to intervene in cyberbullying incidents - even if these incidents were initiated off-campus - if it can be demonstrated that the incident resulted in a substantial disruption of the educational environment"
Anne Bubnic

Teens Launch "Inconvenient Youth" Network - 0 views

  • he group held a three-day workshop on climate change Aug. 15-17 at Stanford University in Palo Alto, Calif. Eighty students from as far away as New York and Japan are learning how to educate others about global warming and what they can do to fight it.
  • Inconvenient Youth is a network founded and driven by a team of four teenagers based in Menlo Park, Calif. Their goal is to mobilize young people to educate their communities about environmental science and solutions using a youth-focused version of "An Inconvenient Truth."
  •  
    Inconvenient Youth, a new non-profit, non-partisan network for and by teens has started recruiting and training young people to fight global warming, according to an Aug. 15 press release. Today the group launched with a three-day workshop on climate change at Stanford University attended by youth from around the world.
Anne Bubnic

Why the Google generation isn't as smart as it thinks. - 0 views

  • Distracted: The Erosion of Attention and the Coming Dark Age
  • Attention is the golden key to the mystery of human consciousness; it might one day tell us how we make the world in our heads. Attention comes naturally to us; attending to what matters is how we survive and define ourselves.
  • Multitaskers fool themselves by rapidly switching attention and, as a result, their output deteriorates.
  • ...1 more annotation...
  • Meyer says there is evidence that people in chronically distracted jobs are, in early middle age, appearing with the same symptoms of burn-out as air traffic controllers. They might have stress-related diseases, even irreversible brain damage. But the damage is not caused by overwork, it’s caused by multiple distracted work. One American study found that interruptions take up 2.1 hours of the average knowledge worker’s day
  •  
    The digital age is destroying us by ruining our ability to concentrate.
Anne Bubnic

Cyber Safety/Social Networking Safety Measures - 0 views

  • For the past two years Blumenthal and other states' attorneys general have negotiated with both Facebook and MySpace to implement more than 60 new safety measures to protect children from online predators and from gaining access to inappropriate content, like pornography.
  • Under the agreement with Facebook, its officials have agreed to prominently display safety tips, and to require users under the age of 18 to affirm that they have read the tips. Users over 18 can no longer search for under-18 users, and Facebook officials will automatically be notified when someone under 18 is in danger of providing personal information to an adult user.
  • Parents will also be provided with tools to remove a child's profile from the site. Inappro­priate images and content will be removed, and ads for age-restricted products, like alcohol and tobacco, will be limited to users old enough to purchase those items. Most significantly, Facebook agreed to diligently search for and remove profiles of registered sex offenders, and it will "in­crease efforts to remove groups for incest, pedophilia, cyber-bullying and other violations of the site's terms of service and expel from the site individual violators of those terms."
  • ...2 more annotations...
  • Under the agreement, MySpace now allows parents to submit their child's e-mail address to prevent anyone from using that e-mail address to set up a profile (e-mail addresses are required in order to set up an account for either Facebook or MySpace, and people may search for "friends" by entering e-mail addresses). For anyone under 16, MySpace will automatically set the profile to "private," allowing only approved people to view the profile. There is now a closed "high school" section of the site set aside for users under 18.
  • Like Facebook, MySpace officials will also "obtain and constantly update a list of pornographic Web sites and regularly sever any links" between the sites. MySpace agreed to provide a way to report abuse on every page that contains content. The site's officials also prom­ised to respond to complaints of inappropriate content within 72 hours.
  •  
    Connecticut Attorney General Richard Blumenthal has made it one of his priorities to install methods of protection for the state's children when it comes to using these Web sites, hoping to "make social networking safer," according to a press release generated by his office. Efforts by Facebook and MySpace to protect privacy are described in this article.
1 - 20 of 751 Next › Last »
Showing 20 items per page