Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged can't

Rss Feed Group items tagged

Anne Bubnic

Cyber Bullying is something kids can't talk about - 0 views

  •  
    Although there are those high-profile news stories of how cyber bullying has led kids to commit suicide, most of it is much lower key. High-school-age kids tell stories of how cyber bullying has become a routine part of the world they inhabit, so pervasive that they can't imagine a time when it didn't take place.
scottrobert

Monster Vs Piggies - 0 views

  •  
    The game Monster vs Piggies is the story of a zombie monster who is tapped out and would like to catch some sleep but due to the tiny monsters in his neighborhood he can't. It was a different story before when he used to be a singing monster proudly singing 'I'll get up when pigs fly'.
Judy Echeandia

Teacher-student Web friendships restricted by Lamar school board - 0 views

  • "The only intent is to limit the personal communication between teachers and students. We don't need to let it cross the line between professional and personal communication."
  •  
    Teachers and students in Lamar County, Mississippi, can't be Internet friends this year after the School Board revamped rules prohibiting them from being friends through online social networks.
Anne Bubnic

Realizing Ed Tech's Potential in the Face of Internet Issues - 0 views

  •  
    Instead of using scare tactics and statistics that are misleading, we must paint a realistic picture and use statistics appropriately. Rather than pass legislation that puts constraints on schools, Congress needs to fund online safety education and public awareness campaigns that show the true picture. "You can't get there from here." it's not just the punch line of a driving direction joke. For educators, whose destination is the realization of educational technology's potential, that punch line sometimes seems closer to the truth than we like.
Anne Bubnic

Silencing Cyberbullies [NEA Today] - 0 views

  •  
    Digital sticks and stones can't break bones-but they can hurt even more. What can educators do to curb bullying in cyberspace? Talk about it," says Cathy Smith. "Define it and discuss expectations and consequences. Don't ignore it or take it lightly." To get kids talking about cyberbullying, Smith meets her students where they live: online. The article cites classroom strategies, including use of some of the information we've collected on this site: NetSmartz videos and Ad Council PSA's

Colette Cassinelli

Bulletin Board [PSA] - 0 views

  •  
    Bulletin Board video - "Once you post your image online - you can't take it back"
Colette Cassinelli

Netsmartz: Real Life Stories [Video] - 0 views

  •  
    These powerful stories teach teens to examine their behavior and encourage them to be proactive in preventing victimization of themselves and others.Teens share their own "Real-Life Stories" about issues affecting them on the Internet such as cyberbullying, online enticement, and giving out too much personal information. At CTAP, we love these videos and frequently feature them in our workshops and trainings "Feathers in the Wind" and "You Can't Take It Back" are two of our favorites. "Amy's Choice" is also a compelling video clip.
Anne Bubnic

The Quality Information Checklist [QUICK] - 0 views

  •  
    It's important to teach students that just as we don't believe everything we hear on the radio, in the newspaper, on T.V., we can't believe everything on the Internet. Although the QUICK web site hasn't been updated since 2000, it does contain 8 great tips for evaluating web site information. They are presented in a clear and concise style with colorful graphics that will appeal to kids. Usually, such tips are offered by school librarians. This site was developed as an aid for consumers seeking health information.
Anne Bubnic

Twitter, Texting Blamed for Students' Bad Grammar - 2 views

  •  
    Little or no grammar teaching, cellphone texting, social networking sites like Facebook and Twitter, all are being blamed for an increasingly unacceptable number of post-secondary students who can't write properly.
Anne Bubnic

Schools left in the dust on social media highway - 2 views

  •  
    There are no policies at any of the three districts that directly addresses popular social networking Web sites, because, administrations are finding, they can't keep up with technology.
Anne Bubnic

Teaching Kids to Manage their Digital Footprint - 2 views

  •  
    Teaching kids to manage their Digital Footprint really starts with the adults. Teachers can't teach this effectively if they, themselves have not managed their own digital footprint. It is also important not to confuse managing a digital footprint with being hidden or private. Branding our identities has become more and more important in the digital age and if students and teachers aren't actively managing their digital footprint, then who is?
Anne Bubnic

Smokescreen game guides teenagers through dangers of social networking - 1 views

  •  
    A free-to-play "alternate reality game" from the UK commissioned by Channel 4 Education that is intended to give teenage players a personal encounter with everything from identity theft to cyber stalking. Kids (age 14-16) explore websites, search for clues, receive phone calls, chat on IM, and tackle puzzles and mini-games. Through thirteen challenges, (each lasting 10-20 minutes) and a dramatic storyline, they find out who they can trust and who they can't.
Rob Reynolds

Thinkuknow - home - 2 views

  •  
    Interactive resources by different age groups for learning about digital citizenship.  Unfortunately can't download resources (UK citizens only) but the games are still accessible.
Anne Bubnic

Internet Safety Tips for Parents - 0 views

  •  
    Millions of students head to the nearest computer to conduct school research online. With the Internet's help, they can create everything from detailed projects on rainforests to slide presentations about how a hurricane forms without setting foot in a library."There's a wealth of information on the Internet, and it's a great tool," says Ross Ellis, founder and CEO of Love our Children USA, a child abuse prevention organization that is active in Internet safety. "You can't keep kids off the Internet." Yet the Internet is not the place for an all-access pass. Kids of all ages need parental supervision. A few common-sense tips can help keep your child safe online.
Anne Bubnic

Copyright for Educators [Video] - 0 views

  •  
    This series of videos, called, "Copyright for Educators," is designed to help educators learn about Fair Use and what they can and can't do within the category of, "Teaching" in the Copyright Act. Hall Davidson is your host.
Anne Bubnic

Defense: Prosecutors can't bend law to fit MySpace hoax - 0 views

  •  
    A defense attorney for the Missouri woman charged in a MySpace hoax that allegedly led to a 13-year-old girl's suicide argued Monday in court papers that prosecutors are bending a cyber crime statute to prosecute his client.
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • ...3 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Anne Bubnic

High Maintenance : 1:1 Laptop Programs - 0 views

  • FEW DISTRICTS HAVE MORE MILES on their 1-to-1 computing initiatives than Texas' Irving Independent School District, where the teachers have had laptops since 1996 and the current student program began with a pilot launched in 2001. Today, the Irving 1-to-1 program puts close to 12,000 laptops in the hands of students and teachers throughout the district.
  • After nearly a decade, Owen and her team have learned a few things about maintaining 1-to-1 computer programs in K-12 environments. The cornerstone of her strategy: personnel. Owen keeps two technicians on duty at the 1-to-1 high school campuses, and one at every other campus. On top of that, the district employs a central team of five technicians whose job it is to resolve problems that people at the campus level can't handle.
  •  
    Running a successful 1-to-1 program requires diligent upkeep-- along with a few veteran tricks of the trade.
Anne Bubnic

Researchers help define next-gen social networking - 0 views

  • The researchers also discussed opinions, some of them perhaps surprising, on other notable subjects in the online social-networking space. Lawley, who has a 14-year-old son, said she is strongly against some of the restrictive methods used online to segregate adults from children in an attempt to protect kids from predators. On Second Life, for example, she can't interact with her son because he has to be in the teen grid and she has to be in the adult grid.
  • "So I don't learn from him about how to use technologies, and he doesn't learn from me about how to interact in a social context," she said. Shutting down sites or trying to shut out people won't solve the problem of sexual predators, she said. "We don't talk about shutting down the Catholic Church," she said, referring to the clergy sex-abuse scandal. "Sexual deviancy isn't unique to the online world."
  •  
    Users need the ability to build small communities, rather than being forced into large ones
Anne Bubnic

The Millennials Are Coming! - 0 views

  • Most agencies manage sensitive citizen data: addresses, Social Security numbers, financial records and medical information. You name it, some state or local office has it, and probably electronically. The problem? Many theorize that the Millennials' penchant for online openness could unintentionally expose private information, leaving it ripe for the picking. Millennials bring innovative ideas about technology's use, but for that same reason, do they also pose new security risks?
  • Anti-virus vendor Symantec released a study in March 2008 assessing this issue. Symantec commissioned Applied Research-West to execute the study, and 600 participants were surveyed from different verticals, including government. Survey participants included 200 IT decision-makers, 200 Millennial workers and 200 non-Millennial workers born before 1980. The data revealed that Millennials are more likely than workers of other ages to use Web 2.0 applications on company time and equipment. Some interesting figures include: 69 percent of surveyed Millennials will use whatever application, device or technology they want at work, regardless of office IT policies; and only 45 percent of Millennials stick to company-issued devices or software, compared to 70 percent of non-Millennials.
  • How might young people be workplace assets? Could all that time typing or texting make them speedy typists, able to whip up memos at the drop of a hat? Does familiarity with new and emerging technologies have its benefit? You bet, according to Dustin Lanier, director of the Texas Council on Competitive Government. The council brings state leaders together to shape policy for government departments, including IT. "I think they've built an approach to work that involves a lot of multitasking," Lanier said of the Millennials. "Something will be loading on one screen, you alt-tab to another application and pull up an e-mail, the first process loads, you flip back, start a new process, flip to a forum and pull up a topic. It's frenetic but normal to that group." Lanier doesn't think Millennials present more of an IT threat than their older co-workers. After all, young people don't have a monopoly on being distracted in the office. "I can't tell you how many times I've walked by people's desks of all ages and seen Minesweeper up," he said. He thinks employers should embrace some Web 2.0 applications. Otherwise, Millennials might be discouraged from sticking around. According to Lanier, this younger work force comprises many people who think of themselves as free agents. Government should accommodate some of their habits in order to prevent them from quitting.
  •  
    Get ready CIOs. They're coming. They have gadgets and doohickeys galore. They like their music downloadable and portable, and they grew up with the Internet, not before it. Their idea of community is socializing with people in other cities or countries through Facebook, MySpace or instant messages, and they use e-mail so often they probably think snail mail is an endangered species. They're the Millennials - those tech-savvy, 20-somethings and-under bound to warm up scores of office chairs left cold by retiring baby boomers. There's a good chance many will come to a government workplace near you, but their digital literacy could prove worrisome for security-conscious bosses.
1 - 20 of 26 Next ›
Showing 20 items per page