Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged computer

Rss Feed Group items tagged

Anne Bubnic

Digital Natives and the Myth of Multi-Tasking - 0 views

  • Dave Crenshaw discussed his latest book, The Myth of Multitasking. Crenshaw makes a strong distinction behind “background tasking”—reading a magazine while waiting in line, for instance, or listening to music while coding—and “switch-tasking.” Most of the time, when we talk about “multi-tasking,” we’re actually talking about the very costly practice of “switch-tasking.” Every time you switch your attention from one place to another—even from one browser window to another—you take a significant hit to your focus
  • Switch-tasking, he definitively proves, causes you to execute each task more slowly than you would otherwise, with more errors
  • pecifically, what can parents, teachers, and employers do to help their kids, students, and employees focus their attention more effectively? As a kid, student, and employee myself, I have to say that I believe the solution is emphatically not to limit access—at least not for older teens. Rather, I think the key lies in laying out the facts and discussing strategies. Information overload and the allure of infinite access, after all, are challenges that affect everyone with an internet connection—not just young people. And, though writing a stellar book report might not be a cause compelling enough to warrant total focus, every young person will at some point find a pursuit worth paying attention to. Maybe it’s writing short stories; maybe writing music. Maybe it’s making art. But when that pursuit comes along, they’re going to want to know how to firewall their attention, focus their efforts, and—for once—stop switching.
  •  
    What ever happened to old-fashioned "discipline?" This question has come up constantly in my conversations with parents and teachers over the course of my involvement with the Digital Natives project. When parents glance over and see not only 50 browser tabs open on the family computer, but iTunes and a computer game and AIM too-with a book report relegated to a tiny corner of the screen-they're understandably bewildered. How do kids ever get anything done? "I'm just really good at multi-tasking, Mom," a savvy student might reply. And, as long as the work gets done, it seems hard to argue with that logic.
Anne Bubnic

Peer-to-peer Networks for Exchanging Child Pornography Busted - 0 views

  • All of the defendants are charged with possession of child pornography, and some are charged with additional offenses, such as production of child pornography and committing crimes while registered as sex offenders. Those charged include a law enforcement officer, attorneys and men with previous convictions related to the child pornography.
  • These cases are the result of a coordinated investigation in which law enforcement used sophisticated software to track down computers on which child pornography was being stored and made available to others via peer-to-peer networks. Peer-to-peer networks are an increasingly popular method for sharing files on the Internet. Using software programs such as Limewire, computer users can join networks that allow the sharing of files across the Internet, often for no charge.
  • Robert Schoch, special agent in charge for the ICE office of investigations in Los Angeles, stated: “Today, those involved in child exploitation - like everyone else - are using the remarkable reach of the Internet, and peer-to-peer technology is the latest frontier. But we have a message for child sex predators who think they can escape justice by hiding in Cyberspace. We will do everything in our power and use every tool at our disposal to keep our children safe - whether they are around the block or around the world.”
  •  
    Federal and local authorities arrested seven men for possession of child pornography today as part of an ongoing multi-agency investigation spearheaded by U.S. Immigration and Customs Enforcement (ICE) and the FBI that has resulted so far in the filing of charges against 55 defendants who allegedly used peer-to-peer networks to exchange sexually graphic images of children.
Anne Bubnic

Preferring the Web Over Watching TV - 0 views

  •  
    Parents who worry that their children watch too much television can take heart: a bigger concern may be children spending too much time online. For children ages 10 to 14 who use the Internet, the computer is a bigger draw than the TV set, according to a study recently released by DoubleClick Performics, a search marketing company. The study found that 83 percent of Internet users in that age bracket spent an hour or more online a day, but only 68 percent devoted that much time to television.
Anne Bubnic

Sly Students Spell Trouble for Hapless Admin - 0 views

  •  
    A computer admin at the school I attended bought a new proxy server to stop our file sharing. It was supposed to block "bad" Web sites in addition to filtering out some of the ports that P2P programs use. Trouble was, all we had to do was use a service such as Proxify to get around it.
Anne Bubnic

Educators struggle with AUP enforcement - 0 views

  •  
    At a time when computers and internet access are seen as increasingly important tools for instruction, many school leaders are struggling with how best to enforce these policies in the event that students transgress them.
Anne Bubnic

Missouri governor signs Internet harassment bill - 0 views

  •  
    Missouri Gov. Matt Blunt signed a bill Monday outlawing cyberbullying, just miles from where a 13-year-old girl committed suicide nearly two years ago after being harassed on the Internet.\n\nThe bill updates state laws against harassment by removing the requirement that the communication be written or over the telephone. Supporters say the bill now covers harassment from computers, text messages and other electronic devices.
Anne Bubnic

NECC highlights tech's 'transformative' power - 0 views

  • Become powerful advocates for change. Regardless of who inhabits the White House next year, educational technology must play a more prominent role in our national education policy, Davis said--and educators should do everything they can to ensure that it does.
  • Share your knowledge and your passion. Help others take steps to ensure their growth as teachers, Davis said--so they can help students grow as learners. 3. Showcase your work, and students' work, in innovative ways. Invite parents and community leaders into your schools, Davis said--or take students' projects to them with the help of podcasts and other technologies.
  • Dream big. Have high expectations for your students, Davis said, because the possibilities that educational technology offers are "endless." 5. Use all of the resources available to you as you try to effect change. These include ISTE's many online resources, such as the group's National Educational Technology Standards and its research-based reports.
  •  
    2008 National Educational Computing Conference also touts collaboration as a key to 21st-century learning
Anne Bubnic

The new philanthropists: Silicon Valley teens - 0 views

  •  
    Meet the new philanthropists - Silicon Valley teens with innate computer networking skills, affluent family connections and the one-click ability to bear witness to global poverty.
Anne Bubnic

ISTE | NETS for Teachers 2008 - 0 views

  •  
    NETS for Teachers 2008
    Unveiled June 30 at the National Educational Computing Conference (NECC) in San Antonio, ISTE's revised National Educational Technology Standards (NETS) for Teachers mark a significant overhaul of the group's original teacher technology standards, which ISTE introduced in 2000. The revised framework focuses on what teachers should know to help students become productive digital learners and digital citizens.
Anne Bubnic

The Anthropology of Digital Natives Webcast (Library of Congress) - 0 views

  •  
    Young people today born into a digital world are experiencing a far different environment of information-gathering and access to knowledge than a generation ago. Who are these "digital natives" and what are they thinking? How are they using the technology, and are IT experts adequately responding to them? These questions will be addressed in a new Library of Congress series titled "Digital Natives." The four-lecture series will examine the generation that has been raised with the computer as a natural part of their lives, with emphasis on the young people currently in schools and colleges today. The series will seek to understand the practices and culture of these digital natives, the cultural implications of the phenomenon and the implications for education -- schools, universities and libraries.
Anne Bubnic

Messaging Shakespeare | Classroom Examples | - 0 views

  • Brown's class was discussing some of the whaling calculations in Moby Dick. When one student asked a question involving a complex computation, three students quickly pulled out their cell phones and did the math. Brown was surprised to learn that most cell phones have a built-in calculator. She was even more surprised at how literate her students were with the many functions included in their phones. She took a quick poll and found that all her students either had a cell phone or easy access to one. In fact, students became genuinely engaged in a class discussion about phone features. This got Brown thinking about how she might incorporate this technology into learning activities.
  • Brown noticed that many students used text messaging to communicate, and considered how she might use cell phones in summarizing and analyzing text to help her students better understand Richard III. Effective summarizing is one of the most powerful skills students can cultivate. It provides students with tools for identifying the most important aspects of what they are learning, especially when teachers use a frame of reference (Marzano, Pickering, & Pollock, 2001). Summarizing helps students identify critical information. Research shows gains in reading comprehension when students learn how to incorporate isummary framesi (series of questions designed to highlight critical passages) as a tool for summarizing (Meyer & Freedle, 1984). When students use this strategy, they are better able to understand what they are reading, identify key information, and provide a summary that helps them retain the information (Armbruster, Anderson, & Ostertag, 1987).
  • Text messaging is a real-world example of summarizing—to communicate information in a few words the user must identify key ideas. Brown saw that she could use a technique students had already mastered, within the context of literature study.
  • ...2 more annotations...
  • To manage the learning project, Brown asked a tech-savvy colleague to help her build a simple weblog. Once it was set up, it took Brown and her students 10 minutes in the school's computer lab to learn how to post entries. The weblog was intentionally basic. The only entries were selected passages from text of Richard III and Brown's six narrative-framing questions. Her questions deliberately focused students' attention on key passages. If students could understand these passages well enough to summarize them, Brown knew that their comprehension of the play would increase.
  • Brown told students to use their phones or e-mail to send text messages to fellow group members of their responses to the first six questions of the narrative frame. Once this was completed, groups met to discuss the seventh question, regarding the resolution for each section of the text. Brown told them to post this group answer on the weblog.
  •  
    Summarizing complex texts using cell phones increases understanding.
Anne Bubnic

Cyberbullying in the Digital Age - 0 views

  •  
    This book was written by three school psychologists, all certified in Olweus Bullying Prevention training. They have applied their knowledge in that area to "cyberbullying." If you are an educator or a parent of an adolescent, this book is a must read. As the authors have stated, the impact of students using computers, etc. has had not only a positive but also a negative impact on the learning environment and safety issues within our schools. Cyberbullying in its infancy is creating an epidemic of problems. Awareness of the problem, what schools and parents should do to address cyberbullying, how the different states and schools systems view cyberbullying, and current resources are discussed by the authors. It is a compilation of the most current research.
Anne Bubnic

WEB|WISE|KIDS: MIRROR IMAGE [Interactive Software Adventure] - 0 views

  •  
    3rd in the Cybercop Series. MIRROR IMAGE tells the story of teenagers Sheena and Megan, best friends who are victimized by a criminal who uses the Internet to lure young women with promises of modeling contracts and online romance. Neither of the girls realizes that hacking software has been placed on their computers during their conversations with their 'online boyfriends.' Soon Sheena and Megan begin to suspect that someone is stalking them in real life. Players work with a detective to track the predator and arrest him. Available both as a home edition and a school edition. [Windows and Mac OSX versions available]
Anne Bubnic

Cyberethics for Teachers - 0 views

  •  
    Cyberethics curriculum and lesson plan created for elementary and middle school teachers by the Department of Justice. Covers computer crimes like hacking and pirating software or music.
Anne Bubnic

Schools' cyber security needs improvement - 0 views

  •  
    School districts are improving their physical security, but they might be neglecting the security of their computer infrastructure, if the results of an annual survey are any indication. The average physical safety rating of K-12 school districts improved by 39 percent over 2007, while the average cyber safety rating declined by 25 percent during the same time period, according to CDW-G's "2008 School Safety Index," which is designed to mark the current state of K-12 school safety.
Anne Bubnic

Teachable Moment: Student Hacking Experience - 0 views

  •  
    Made a mistake? Own it, Fix it, Learn from it." Learn how this teacher developed a student contract and handled the consequences of computer hacking attempts by her students.
Anne Bubnic

OnGuard Online - Quizzes - 0 views

  •  
    OnGuardOnline.gov provides practical tips from the federal government and the technology industry to help you be on guard against Internet fraud, secure your computer, and protect your personal information. There are ten colorful flash-based quizzes here appropriate for students on security topics such as phishing, hackers, spyware etc.
Anne Bubnic

Cyberethics: Downloading Music from the Internet | eMINTS - 0 views

  •  
    Cyberethics curriculum from the eMINTS project. These sites highlight the debate about downloading music from the Internet for free. Watch videos of musicians expressing their thoughts on the issue. There is also information about copyright law and explanations about why these types of downloads are considered illegal and unethical. The sites are helpful for teachers who want students to debate the issue. There are links to eThemes Resources on Internet safety and computer basics.
Anne Bubnic

OnGuard Online: Phishing - 0 views

  •  
    Educational partnership with I-Safe. OnGuardOnline.gov provides practical tips from the federal government and the technology industry to help consumers be on guard against Internet fraud, secure your computer, and protect your personal information. This site also includes three PSA's that can be shown in the classroom.
Anne Bubnic

staysafe.org Toolbox - Video Library - 0 views

  •  
    Watch these short videos to learn more about the top security issues that affect consumers like you. If you're new to learning about protecting your computer and your information online, you can start with the basics.
« First ‹ Previous 41 - 60 of 135 Next › Last »
Showing 20 items per page