As a group, libraries have embraced the digital age," said Lee Rainie, founding director of the Pew Internet & American Life Project, which has surveyed public attitudes toward libraries. "They've added collections, added software and hardware, upgraded the skills of their staff. A lot of institutions have had to change in the Internet age, but libraries still have a very robust and large constituency."
A December 2007 Pew survey found that more than half of Americans — 53% — visited a library in the past year. That's expected to grow as more people look for free resources and entertainment in a slowing economy.
1More
Digital Citizenship: Monitoring Technology Use & Abuse [pdf] - 0 views
digitalcitizenship.pbwiki.com/...RaisingGoodDigitalCitizens.pdf
ad4dcss digital citizenship teacher guide lesson plan pdf ribble
shared by Anne Bubnic on 03 May 09
- Cached
-
THE JOURNAL (arcticle) by Mike Ribble and Gerald Bailey. Provides a five-step program for creating a digital citizenship program in your school.Over the last two years, it has become evident that a behavior pattern of misuse and abuse with respect to technology is \nbeginning to emerge in our society. This outbreak of \ntechnology misuse and abuse is documented in continual news \ncoverage on TV, in newspapers and on the Internet - both \ninside and outside of schools. The endless list of misuse and \nabuse includes hacking into school servers, using e-mail to \nintimidate or threaten students, illegally downloading music, \nplagiarizing information from the Internet, using cellular \nphones during class time, accessing pornographic Web sites, \nand playing video games during class. Therefore, if you are \nusing technology in your district, you must begin to deal with \ndigital citizenship in a significant way. \n
1More
Buy Verified LiLi Accounts - Buy Global Shop - 0 views
buyglobalshop.com/...buy-verified-lili-accounts
Best LiLi Account Buy Accounts Verified How to open sell for USA What is Description Additional information Reviews (1)
shared by buyglobalshop on 07 Jun 24
- No Cached
-
Have you listened almost LiLi accounts and pondered what they are all almost? Well, you're not alone! LiLi accounts, brief for Constrained Risk Venture accounts, are a sort of speculation item that offers a special combination of development potential and resource security for financial specialists. These accounts give a layer of assurance for financial specialists by constraining their risk in the case of monetary misfortunes, making them a well known choice among those looking to oversee chance whereas still looking for openings for development in their venture portfolios. Buy Verified LiLi Accounts What precisely is a LiLi account? Have you ever listened of a LiLi account and pondered what precisely it is? In today's advanced keeping money world, there are bounty of modern account choices accessible, and LiLi is one of them. A LiLi account, brief for "life-living," is a sort of money related item outlined to offer assistance people consistently oversee their cash and accomplish their individual money related objectives. But what sets a LiLi account separated from conventional checking or investment funds accounts? Let's take a closer see at what makes a LiLi account one of a kind and how it might advantage your monetary wellness. Buy Verified LiLi Accounts Unlike conventional accounts, a LiLi account ordinarily offers a combination of managing an account administrations and money related apparatuses all in one put. With a LiLi account, you can effectively track your investing, set reserve funds objectives, and indeed gain rewards for assembly certain money related turning points. Furthermore, a few LiLi accounts may offer competitive intrigued rates, permitting your cash to develop over time. Whether you're looking to spare for a enormous buy or fair need to way better oversee your day-to-day accounts, a LiLi account may be a profitable device in making a difference you reach your money related objectives. Remain tuned to learn more approximately th
6More
America's Libraries adapted to digital age - 0 views
-
At the one-room Watha T. Daniel/Shaw Interim Library in the District of Columbia, books still line the shelves. But on one recent day, almost every adult at the library sat in front of a computer, surfing the Web, checking e-mail or visiting a social networking site.
-
The analysis found that libraries are thriving in the Internet age: •Attendance increased roughly 10% between 2002 and 2006 to about 1.3 billion. Regionally, Southern states lag the rest of the country in visits per capita. •Circulation, which measures how often library visitors check out print or electronic materials, increased about 9%, from 1.66 billion to 1.81 billion during the five-year period.
- ...2 more annotations...
-
•The number of Internet-capable computers soared 39% — from about 137,000 in 2002 to nearly 190,000 in 2006. Libraries in rural states in New England and the Midwest led the country in public computers per capita in 2006. The increase in Internet access is thanks in part to the Bill & Melinda Gates Foundation, which launched a national program in 1997 to bring the Internet to libraries, beginning with the South. By 2003, the foundation had spent $250 million on some 47,000 computers, as well as training and tech support, bringing almost every public library online, said Jill Nishi, deputy director of the foundation's U.S. Libraries initiative. "You should be able to walk into any library and find Internet service," she said. "It's free, unfettered access to information."
-
Free Internet access is particularly important for low-income people, said Ken Flamm, an economics professor at the University of Texas at Austin who has studied the role of the Internet in public libraries. Only about a third of households with incomes below $25,000 have Internet access, according to federal data.
4More
You Have to Be a Parent Online Too - 0 views
-
"When we were kids, our parents always told us not to talk to strangers. That was drilled into our heads," he said. "But now, we have to factor in what happens on the Internet."
-
Security settings and parental involvement are especially important in the virtual world, Morris urged. "Check your child's e- mail account on a regular basis. You're the parent; you can do that."
-
While social networking sites like Facebook, Myspace and Xanga can be hot-spots for sexual predators, "not everything about these sites is bad," Morris said, noting some of the most up-to-date information after the NIU shootings was found on Facebook. "Good things do occur, but we need to make sure we're monitoring them," he said. Morris urged the group to keep home computers in plain sight, to outline their expectations and review communications regularly with their children. "We want to build that level of communication with their kids," he said. "If they're talking to someone they shouldn't, we want them to be able to come to us. A child should be able to listen to a parent more than a predator."
5More
No bullies allowed [Pennsylvania State Initiative] - 0 views
-
A school must have a written bullying policy that includes consequences for violations, identify school personnel to notify with complaints and the policy must be posted in every classroom and be reviewed by students, according to a press release issued by Williams' office.
-
And while school violence had declined 4 percent during the past several years, bullying in schools has risen 5 percent, according to the U.S. Department of Education.
-
The new legislation applies to any threats or intimidation in a school setting, including on school grounds, on a school bus or at any school-sponsored event. Also, the measure covers threats sent via e-mail or over the Internet, called cyber bullying. According to the state Department of Education, every school day 160,000 students miss school because they are afraid of being bullied.
- ...1 more annotation...
-
The anti-bully measure was included in a larger School Code bill in 2008. Greenleaf said he proposed the measure back in 2002, but met with resistance from school districts who worried about the cost of implementing such a program.
3More
Cyber Bullying Presents a Complex Legal Landscape - 0 views
-
Cyber bullying conducted at school allows school authorities to more easily impose discipline. The use of school equipment to cyber bully also makes a stronger legal argument for action by the school. And if the student e-mails offensive speech to school or downloads it at school and then distributes it, the school is in an advantageous position regarding disciplining the student. However, speech created at home—such as the creation of a Web site—affords greater legal protection for cyber bullies.
-
“The problem with the approach that web speech created at home can—if accessed at school—become school speech that can be regulated is the very nature of the Internet. Once something is created and placed on the Internet, the author loses control over who can access the speech and where it can be accessed.”
-
As students across the country return to school, school districts face an often complicated and confusing legal landscape on how to deal with cyber bullies in their schools, according to Todd DeMitchell, EdD, a professor of education, who studies school liability, adequate supervision, and responses to preventing bullying and cyber bullying from school administrators and state legislatures.
5More
Humiliation and gossip are weapons of the cyberbully - 0 views
www.pressandjournal.co.uk/...727383
ad4dcss article cellphone cyberbullying digital wellness school administrator social networking
shared by Anne Bubnic on 25 Jul 08
- Cached
-
ead teachers are being advised to draw up new rules on mobile phone use amid a growing number of cases of what is now known as “cyber-bullying”. In many secondary schools, over 90% of bullying cases are through text messages or internet chatrooms. It is hoped that the rules about mobile phone use will protect children from abusive texts, stop phones going off in class and prevent mobiles being taken into exam halls.
-
Although the majority of kids who are harassed online aren’t physically bothered in person, the cyber-bully still takes a heavy emotional toll on his or her victims. Kids who are targeted online are more likely to get a detention or be suspended, skip school and experience emotional distress, the medical journal reports. Teenagers who receive rude or nasty comments via text messages are six times more likely to say they feel unsafe at school.
-
The problem is that bullying is still perceived by many educators and parents as a problem that involves physical contact. Most enforcement efforts focus on bullying in school classrooms, corridors and toilets. But given that 80% of adolescents use mobile phones or computers, “social interactions have increasingly moved from personal contact at school to virtual contact in the chatroom,'’ write Kirk R. Williams and Nancy G. Guerra, co-authors of one of the journal reports. “Internet bullying has emerged as a new and growing form of social cruelty.'’
- ...1 more annotation...
-
Cyber-bullying tactics include humiliation, destructive messages, gossip, slander and other “virtual taunts” communicated through e-mail, instant messaging, chatrooms and blogs. The problem, of course, is what to do about it. While most schools do not allow pupils to use their mobiles in the school building, an outright ban is deemed unworkable. Advances in technology are throwing up new problems for teachers to deal with. Children use their phones to listen to music, tell the time or as a calculator. Cyber-bullies sometimes disclose victims' personal data on websites or forums, or may even attempt to assume the identity of their victim for the purpose of publishing material in their name that defames them or exposes them to ridicule.
5More
Social Networking Gets Schooled - 0 views
www.technewsworld.com/...rking-Gets-Schooled-63951.html
ad4dcss curriculum digital learning digital media digital youth facebook myspace social networking teachers teacher
shared by Anne Bubnic on 01 Aug 08
- Cached
Judy Echeandia liked it
-
As a whole, the education industry is usually relatively slow to integrate technology into the classroom. In lots of schools nationwide, unbridled access to computers and the Internet is still the exception rather than the rule.
-
The moment students get outside of the classroom, on the other hand, social networking is almost a daily ritual.
-
Dedicated commercial Web 2.0 products and social networking applications are still too new and too rich for typical school leaders to afford. So third-party providers are more likely to offer technology services to students and their schools to expand their horizons in ways never before possible. For example, some school districts are going beyond e-mail technology and using collaboration software and online services to share information, host Web conferences and assign tasks and projects.
- ...1 more annotation...
-
"Teachers are famous for relying on other teachers for the best ideas about what's working and what's not working. For that reason, as new teachers (read younger, tech-savvy, "Generation Network" college grads) enter the system, they are leveraging education-focused social networks to connect with other teachers, find content contributed by teachers and make sure that they are wringing every ounce of 'network effect' technology from the Internet."
-
To today's students, online social networking is almost second nature outside of the classroom. What about inside the classroom? Educational software and services are taking a cue from Facebook and MySpace, adding a twist of online collaboration and interaction that brings students, teachers and parents together.
6More
Kids online? Cox Survey: Contact with strangers is not unusual. - 0 views
www.newsday.com/...onlinekids0725,0,5379845.story
ad4dcss cellphone cybersafety digital communication digital youth
shared by Anne Bubnic on 25 Jul 08
- Cached
-
One in 10 of these preteenagers has responded to and chatted online with strangers, according to the Tween Internet Safety Survey, sponsored by Cox Communications and the National Center for Missing and Exploited Children.
-
90 percent of American kids have used the Internet by age 9 and more than a third of 11- and 12-year-olds have a profile on social-network sites such as MySpace and Facebook.
-
Of the tweens with social-network profiles, 61 percent post personal photos online, 48 percent admit to posting a fake age online and 51 percent have received messages from people they didn't know.
- ...2 more annotations...
-
The survey showed tweens' online presence doubles or even triples among 8- to 10-year-olds and 11- and 12-year-olds: The 42 percent of children 8 to 10 with personal e-mail accounts increases to 71 percent for those 11 and 12, for instance, and 41 percent of 11- and 12-year-olds have an instant-messaging screen name, compared with 15 percent for kids 8 to 10.
-
Half of the 11- and 12-year-olds have their own cell phones -- used for text messaging and taking and transmitting digital photos as well as for traditional calling -- while 19 percent of those 8 to 10 have their own cell phones.
6More
Messaging Shakespeare | Classroom Examples | - 0 views
-
Brown's class was discussing some of the whaling calculations in Moby Dick. When one student asked a question involving a complex computation, three students quickly pulled out their cell phones and did the math. Brown was surprised to learn that most cell phones have a built-in calculator. She was even more surprised at how literate her students were with the many functions included in their phones. She took a quick poll and found that all her students either had a cell phone or easy access to one. In fact, students became genuinely engaged in a class discussion about phone features. This got Brown thinking about how she might incorporate this technology into learning activities.
-
Brown noticed that many students used text messaging to communicate, and considered how she might use cell phones in summarizing and analyzing text to help her students better understand Richard III. Effective summarizing is one of the most powerful skills students can cultivate. It provides students with tools for identifying the most important aspects of what they are learning, especially when teachers use a frame of reference (Marzano, Pickering, & Pollock, 2001). Summarizing helps students identify critical information. Research shows gains in reading comprehension when students learn how to incorporate isummary framesi (series of questions designed to highlight critical passages) as a tool for summarizing (Meyer & Freedle, 1984). When students use this strategy, they are better able to understand what they are reading, identify key information, and provide a summary that helps them retain the information (Armbruster, Anderson, & Ostertag, 1987).
-
Text messaging is a real-world example of summarizing—to communicate information in a few words the user must identify key ideas. Brown saw that she could use a technique students had already mastered, within the context of literature study.
- ...2 more annotations...
-
To manage the learning project, Brown asked a tech-savvy colleague to help her build a simple weblog. Once it was set up, it took Brown and her students 10 minutes in the school's computer lab to learn how to post entries. The weblog was intentionally basic. The only entries were selected passages from text of Richard III and Brown's six narrative-framing questions. Her questions deliberately focused students' attention on key passages. If students could understand these passages well enough to summarize them, Brown knew that their comprehension of the play would increase.
-
Brown told students to use their phones or e-mail to send text messages to fellow group members of their responses to the first six questions of the narrative frame. Once this was completed, groups met to discuss the seventh question, regarding the resolution for each section of the text. Brown told them to post this group answer on the weblog.
10More
Susan Silverman's Lucky Ladybugs project going on for elementary - 0 views
kids-learn.org/...project.htm
best practices connectivity curriculum digital access hz08 hzmeta virtual collaboration
shared by Vicki Davis on 16 Apr 08
- Cached
-
This project will demonstrate lesson plans designed following principles of Universal Design for Learning (UDL) and examples of student work resulting from the lessons. As teachers we should ask ourselves if there are any barriers to our students’ learning. We should look for ways to present information and assess learning in non-text-based formats.
- ...5 more annotations...
-
Based on brain research and new media, the UDL framework proposes that educators design lessons with three basic kinds of flexibility: 1. Multiple formats and media are used to present information.
-
Examples: Illustrations, pictures, diagrams, video or audio clips, and descriptions 2. Teachers use multiple strategies to engage and motivate students. 3. Students demonstrate learning through multiple performance and product formats.
-
UDL calls for three goals to consider in designing lessons: 1. Recognition goals: these focus on specific content that ask a student to identify who, what, where, and when. 2. Strategic goals: these focus on a specific process or medium that asks a student to learn how to do something using problem solving and critical think skills. 3. Affective goals: these focus on a particular value or emotional outcome. Do students enjoy, and appreciate learning about the topic? Does it connect to prior knowledge and experience? Are students allowed to select and discover new knowledge?
-
Resources you might want to use: Scholastic Keys, Kid Pix, Inspiration and Kidspiration, digital camera (still and video), recording narration/music, United Streaming. Let your imagination go!
-
An excellent project for elementary students to connect with other classes.
-
A great way to get started with technology is to join in an exciting project. this project by Susan Silverman was designed using the principles of Universal Design for Learning. I've heard her present and she is a pro. (Along with my friend Jennifer Wagner.)
1More
Sociologist Finds That Students Aren't So Web-Wise After All - 0 views
chronicle.com/...o-web-wise-after-all-interview
ad4dcss cybersafety digital citizenship digital literacy web 2.0
shared by Anne Bubnic on 12 May 08
- Cached
Judy Echeandia liked it
-
[April 08, Journal of Higher Education]
An assistant professor in Northwestern University's sociology department, has discovered that students aren't nearly as Web-savvy as they, or their elders, assume. Ms. Hargittai studies the technological fluency of college freshmen. She found that they lack a basic understanding of such terms as BCC (blind copy on e-mail), podcasting, and phishing. This spring she will start a national poster-and-video contest to promote Web-related skills.
5More
How To Stop Cyber-Bullying - 0 views
-
Yet with so many different types of cyberbullying, ranging from online impersonation to e-mail hacking and distributing embarrassing materials about a person, it can be difficult for kids, let alone those trying to help them, to know how to respond and stop the 21st century bully in his or her tracks. "Awareness about the issue is high, but awareness about what to do when it happens is mixed," says Michele Ybarra, president and research director for Internet Solutions for Kids (ISK) and an adjunct faculty member at Johns Hopkins School of Public Health.
-
Research suggests that those on the receiving end of traditional bullying may be more likely to cyberbully as a form of retaliation. Kids involved in the more severe instances of cyberbullying also tend to have more psychosocial problems, exhibiting aggression, getting in trouble at school and having poor relationships with their parents, says Nancy Willard, an expert on cyberbullying and author of Cyberbullying and Cyberthreats. And while traditional bullying appears to peak in middle school and drop off as kids reach high school, cyberbullying tends to slightly increase among kids in high school, a trend researchers can't yet explain.
-
One of the tricky things about helping cyberbullying targets is that they aren't always willing to talk about the problem. Teens often cite a fear of having their Internet privileges revoked as a reason for keeping quiet, Agatston says. Kids who receive threatening messages in school may not divulge what's happened for fear of getting in trouble, since many schools ban use of cellphones during the day. To get around that problem, Willard recommends having a frank discussion with your children about cyberbullying before it happens.
- ...1 more annotation...
-
Research is also beginning to show that just like traditional forms of bullying, cyberbullying can lead to anxiety, lower rates of self-esteem and higher rates of school absence, says Patti Agatston, a licensed professional counselor with the Prevention/Intervention Center, a student assistance program serving more than 100 schools in suburban Atlanta, Ga.
-
Kids can be mean.\n\nIt's a fact of life we've all experienced. Gone are the days, however, when avoiding a bully meant ducking out of the back door at school. Thanks to personal computers, cellphones and instant messaging, it's now easier than ever for children to attack each other, often anonymously.
10More
Teaching Teenagers About Harassment - 0 views
-
About 20 percent of teenagers have posted or sent nude cellphone pictures of themselves, according to the National Campaign to Prevent Teen and Unplanned Pregnancy, a nonprofit group.
-
The behaviors can be a warning sign that a teenager may become a perpetrator or a victim of domestic violence, according to the group.
- ...6 more annotations...
-
teenagers frequently received digital threats or upsetting requests from people they were dating. But the teenagers were not talking about it, did not know how to handle it and did not know what was appropriate and what was not.
-
“It was abuse that there was no protocol around,” Mr. Law said. The parents were not aware of the interactions, and the teenagers did not know how to prevent it, he said.
-
The campaign and its Web site, ThatsNotCool.com, encourage teenagers to set their own boundaries. It is intended to appeal to all teenagers, not just those with serious problems. “The kids don’t want to be told what’s right and what’s wrong,” Mr. Law said. On the site, teenagers can send one of 35 “callout cards” — brightly colored messages they can send by e-mail, post to their Facebook or MySpace accounts or download — that are meant to tell someone they have crossed a line. The messages are sharp. For example: “Congrats! With that last text, you’ve achieved stalker status.”
-
The site offers an area where teenagers can seek advice, like how to stop a boyfriend from nonstop text-messaging. For more direct advice, the site tells teenagers to call or conduct a live chat with trained volunteers.
-
The campaign is digitally focused, reflecting the way teenagers communicate. Even the posters that will appear in schools, which display some of the “callout card” messages, ask viewers to snap a photo with their cellphone and text-message it to someone.
-
All of the communications are aimed at teenagers, not parents. Ms. Soler said the fund was working on a campaign to alert parents to problems, but for now, she wanted to get teenagers discussing them.“We want to give them the tools to say ‘You can have a healthy relationship, and here’s the road map,’ ” Ms. Soler said.
1More
How Privacy Vanishes Online, a Bit at a Time - 1 views
www.nytimes.com/...17privacy.html
ad4dcss digital footprint privacy social media social networking digital communication
shared by Anne Bubnic on 21 Mar 10
- Cached
2More
Policies Target Teacher-Student Cyber Talk - 1 views
www.edweek.org/...10communication_ep.h29.html
ad4dcss legal digital communication cellphone social networking parents policy cybersafety
shared by Anne Bubnic on 23 Mar 10
- Cached
-
The motivation for the bill was growing problems with [interactions] that started relatively innocently and escalated from there,” sa
-
A new state lawRequires Adobe Acrobat Reader requires all Louisiana districts to implement policies requiring documentation of every electronic interaction between teachers and students through a nonschool-issued device, such as a personal cellphone or e-mail account, by Nov.15. Parents also have the option of forbidding any communication between teachers and their child through personal electronic devices.
2More
Facebook case helps fight cybercrime - 0 views
blog.al.com/...ook_case_helps_fight_cybe.html
ad4dcss cybersafety facebook harrassment law enforcement
shared by JOSEPH SAVIRIMUTHU on 07 May 09
- Cached
-
School resource officers from across Alabama and the nation fielded complaints about an Internet extortionist badgering girls for nude pictures. Victims even created a Facebook page warning females not to talk to the person with the username Metascape. Metascape turned out to be Jonathan Vance, an Alabama man who made lewd cyber requests of 206 girls and young women and attempted to hack into and gain control of their e-mail, Facebook and MySpace accounts, federal authorities say. He was successful in at least 53 cases.
1More