Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged electronic

Rss Feed Group items tagged

Anne Bubnic

Curbing Cyberbullying in School and on the Web - 0 views

  • Many of the most egregious acts of cyberbullying do not take place during school hours or on school networks, a situation that presents a dilemma for public school administrators: If they punish a student for off-campus behavior, they could get hit with a freedom of speech suit.  If they do nothing, students may continue to suffer and school officials theoretically could get hit with failure to act litigation. For school administrators, it appears to be an unfortunate “catch-22.” For lawyers, it’s a “perfect storm,” pitting freedom of speech advocates against the victims of cyberbullying and schools that try to intervene. There are no easy answers in this arena, few laws, and no well-established precedents that specifically deal with cyberbullying.
  • “School administrators can intervene in cyberbullying incidents, even if the incidents do not take place on school grounds, if they can demonstrate that the electronic speech resulted in a substantial disruption to the educational environment.”
  • These cases illustrate not only a lack of precedent on cyberbullying cases, but also a dilemma for school administrators on how to handle cyberbullying.  “There are few laws that address how to handle cyberbullying, and many schools don’t have an internal policy to deal with cyberbullying that takes place off-campus,” offers Deutchman.  “It may take an unfortunate and tragic event on school property to get more schools to consider tackling electronic behavior that originates off campus.  It’s only a matter of time before a cyberbully, or the victim of cyberbullying, uses deadly force during school hours.”
  • ...5 more annotations...
  • So, what should schools do in the meantime?  First, school officials should establish a consistent internal policy (much like a crisis plan) and a team (minimally made up of the principal, school counselor, and technology director) to deal with cyber-misconduct. This team should fully document disruptive incidents and the degree to which the learning environment is affected. The principal should invite the cyberbully’s parents to review the offending material before considering disciplinary action. Most parents at this point will do the right thing.
  • Second, schools should educate children, starting in elementary school, about the importance of cyber-safety and the consequences of cyberbullying, especially on the school’s own network. These rules should be clearly posted in the computer labs and written in age-appropriate language. The rules should be sent home to parents each year—and they should be posted prominently on the school’s website.
  • Third, teachers should continue incorporating in their curriculum projects that utilize the web and other powerful new technologies. This probably won’t help schools avoid lawsuits; it’s just good pedagogy. It’s not surprising that schools that keep up with the latest technology and software—and employ teachers who care about the quality of online communication—report lower incidents of cyber-misconduct.
  • In addition, schools should update their codes of conduct to include rules that can legally govern off-campus electronic communication that significantly disrupts the learning environment. They should also assign enough resources and administrative talent to deal with students who engage in cyber-misconduct. One very big caveat: Disciplining a student for off-campus electronic speech should be done only as a last resort, and certainly not before seeking legal counsel.
  • Finally, schools should realize that not all cyberbullies need to be disciplined. Schools should act reasonably, responsibly, and consistently—so as to avoid the very bullying behavior they are trying to curb. Until the courts provide clear standards in the area of off-campus electronic speech for young people, these recommendations will go a long way in making schools a safer learning environment for everyone.
  •  
    Most school administrators have more than one story to tell about cyberbullying. They report that victims of cyberbullying experience low self-esteem, peer isolation, anxiety, and a drop in their grades. They note that victims may miss class or other school-related activities. Principals also point to recent high-profile cases where cyberbullying, left unchecked, led to suicide. In response, some schools have created new policies and curbed free speech on the school's computer network and on all electronic devices used during school hours. This article offers practical advice for actions schools can take to curb bullying, ranging from policy development to education.
Anne Bubnic

Electronic Media and Youth Violence [CDC Report] - 0 views

  •  
    Electronic Media and Youth Violence: A CDC Issue Brief for Educators and Caregivers focuses on the phenomena of electronic aggression. This document was developed for educators and caregivers. It summarizes what is known about young people and electronic aggression and discusses the implications of these findings for school staff, educational policy makers, and caregivers. You can download the full report at this site.
rhcmed

electronic vital sign machine - 1 views

  •  
    G3N Electronic Vital Sign Monitors deliver exceptional performance and advanced features. With a focus on fast defibrillation recovery, it ensures swift response in critical situations. The electronic vital sign machine boasts an accurate and stable display of ECG/HR, providing precise monitoring. Offering up to 34 classifications of arrhythmia analysis, along with ST-segment analysis, bed-to-bed view, venipuncture, pace-maker integration, and drug calculation, the electronic vital sign monitors provide comprehensive diagnostic capabilities.
JOSEPH SAVIRIMUTHU

Lawmakers Put Stop To 'Cyberstalking' - 0 views

  • “This cyber-safety bill is a critical step toward protecting Kentuckians from the very real threats that come with 21st century innovations and toward helping to prevent further abuses of these technologies,” said Beshear. “Kentucky families will be safer because of this bill.”HB 315, which was authored by Conway and primarily sponsored by Bell, makes it a Class D felony to solicit a minor for sexual activity through electronic communication. Through this legislation it is unlawful to “cyberstalk,” which is defined as intentionally alarming, annoying, intimidating or harassing a person with no legitimate purpose through electronic communication. This bill also includes tougher regulations for sex offenders when they use electronic communication.
  •  
    HB 315, which was authored by Kentucky Attorney General Jack Conway and primarily sponsored by Bell, makes it a Class D felony to solicit a minor for sexual activity through electronic communication.
Anne Bubnic

California Assembly Bill 86 - 0 views

  •  
    Existing law, the Interagency School Safety Demonstration Act of 1985, states that the intent of the Legislature in enacting its provisions is to encourage school districts, county offices of education, law enforcement agencies, and agencies serving youth to develop and implement interagency strategies, in-service training programs, and activities that will, among other things, reduce school crime and violence, including bullying. Existing law establishes the School/Law Enforcement Partnership and charges it with undertaking several efforts intended to reduce school crime, as specified,including bullying.

    This bill would specify that bullying, as used in these provisions,means one or more acts by a pupil or a group of pupils directed against another pupil that constitutes sexual harassment, hate violence, or severe or pervasive intentional harassment, threats, or intimidation that is disruptive, causes disorder, and invades the rights of others by creating an intimidating or hostile educational environment, and includes\nacts that are committed personally or by means of an electronic act, as defined.

    Existing law prohibits the suspension, or recommendation for expulsion, of a pupil from school unless the principal determines that the pupil has committed any of various specified acts, including, but not limited to, hazing, as defined. This bill, in addition, would give school officials grounds to suspend a pupil or recommend a pupil for expulsion for bullying, including, but not limited to, bullying by electronic act.

Anne Bubnic

SB 2426 Cyberbullying Law passes [Illinois] - 0 views

  •  
    Amends the Harassing and Obscene Communications Act. Creates the Cyberbullying Law. Provides that the offense of harassment through electronic communications also includes the use of electronic communication for making a harassing statement for the purpose of alarming, tormenting, or terrorizing a specific person on at least 2 separate occasions; or creating and maintaining an Internet website or webpage, which is accessible to one or more third parties for a period of at least 24 hours, and which contains harassing statements made for the purpose of alarming, tormenting, or terrorizing a specific person. Establishes penalties. Effective immediately. The new law takes effect January 1st and provides that the Internet safety curriculums in schools will begin with the 2009-2010 school year. The bill allows the age-appropriate unit of instruction to be incorporated into the current courses of study regularly taught in the districts' schools.
Anne Bubnic

Cyberbullying The Real Threat on the Digital Playground - 0 views

  • "Parents are the key to this whole issue," explains Leasure. "They need to be involved and monitoring the computer and Internet activity of their kids. If they see something that isn't right, they need to act as parents and correct the issue."
  • parental awareness is truly the key to fixing this problem. If your child is the victim - or worse, the bully - it's time to step in. it's not being over-protective; it's trying to stop the current generation from 'virtually' destroying themselves emotionally
  • Cyberbullying Statistics: A recent survey of 395 students, ages 11 to 19, was conducted by the Kids/Teen Division of the Maine-based online safety organization Working To Halt Online Abuse. The study found that: � 28% of students have been cyberbullied, but... � Just over half tell their parents or another adult about it; of the students who did not report the cyberbullying, 25% felt it wasn't a big problem or didn't want to make a big deal out of it � 65% reported the cyberbullying was via IM, followed by email, MySpace, chat rooms and online games � 43% were cyberbullied by someone their age or in the same grade � 30% blocked or deleted the cyberbully, while 16% ignored them � 54 students admitted they had bullied somebody online themselves
  •  
    While reports and stories in the media focusing on Internet predators have become all too frequent, the closer-to-home threat to our children may really be cyberbullying, also known as electronic or online bullying. A recent survey of 395 students (11 to 19 years old) found that 28% of students have been cyberbullied, and more than 1 in 7 admitted to acting as the bully."Cyberbullying could be the biggest online threat facing teens today," says James Leasure, co-founder of Pandora Corp. "Of course Internet predators do still exist, but statistically, kids have a much greater chance of being involved in some way with electronic bullying." Most cases of cyberbullying go undocumented because, fortunately, many kids are able to shrug off the 'unkind words' and look the other way. But there are some cases that make national headlines when they turn into tragedies, such as the Megan Meier case in 2006. Larger cases like this have prompted several states to adopt legislation that makes online bullying illegal.
Vicki Davis

Search and Seizure of Cell Phones: Can You Hear Me Now? - 0 views

  • May school officials lawfully “search” the confiscated cell phone to look at stored text messages, photographs, videos, and logs of incoming and outgoing calls? Clearly, the circumstances of the search must satisfy the T.L.O. standard. Not as clear, however, is whether such a search violates federal or Michigan laws regarding stored electronic communications.
  • [A] search of a student by a teacher or other school officials will be ‘justified at its inception’ when there are reasonable grounds for suspecting that the search will turn up evidence that the student has violated or is violating either the law or the rules of the school. Such a search will be permissible in its scope when the measures adopted are reasonably related to the objectives of the search and not excessively intrusive in light of the age and sex of the student and the nature of the infraction.”
  • In Klump v Nazareth Area Sch Dist, 425 F Supp 2d 622 (ED Pa, 2006), a federal district court denied the school’s motion to dismiss a lawsuit filed by a student whose cell phone was searched.
  • ...5 more annotations...
  • compensatory and punitive damages for the alleged unconstitutional search, violation of the Pennsylvania Wiretapping and Electronic Surveillance Control Act, invasion of privacy, and defamation.
  • The court ruled that the student had stated a claim for the alleged violation of his right to be free from an unreasonable search.
  • here was no basis for them to search the text and voice mail messages stored on the phone.
  • unlawful access to the stored voice mail and text message communications.
  • (2) A person shall not willfully and maliciously read or copy any message from any telegraph, telephone line, wire, cable, computer network, computer program, or computer system, or telephone or other electronic medium of communication that the person accessed without authorization. (3) A person shall not willfully and maliciously make unauthorized use of any electronic medium of communication, including the internet or a computer, computer program, computer system, or computer network, or telephone.
  •  
    Legal Implications for Searching Student Cell Phones. Although this article is written against Michigan law, it does help clarify some of the concepts for what is permissable. Note that searching a student's cell phone or wireless device without parent permission may violate state wiretapping laws.
  •  
    Confiscating and looking at information on cell phones by school officials is still not clear. This is a very interesting case study for those working with digital citizenship issues at their school.
  •  
    Fascinating article explaining Michigan take on searching and confiscating cell phones.
Anne Bubnic

ReadWriteThink: Electronic Messaging & How It Affects Other Writing - 0 views

  •  
    With the increasing popularity of e-mail and online instant messaging among today's teens, a recognizable change has occurred in the language that students use in their writing. This lesson explores the language of electronic messages and how it affects other writing. Furthermore, it explores the freedom and creativity for using Internet abbreviations for specific purposes and examines the importance of a more formal style of writing based on audience.
Anne Bubnic

Bringing Internet privacy into the 21st century - 0 views

  •  
    Finally, there's something Google and Microsoft can agree on: Our electronic privacy protections are in serious need of an overhaul. They, along with Intel, AOL, AT&T, the ACLU, and a dozen other household names, have formed the Digital Due Process coalition, aimed at urging Congress to modernize the Electronic Communications Privacy Act (ECPA) -- the only thing keeping Johnny Law from pawing through your digital life.
Anne Bubnic

Don't Hit That 'Delete' Button!: Email Archiving - 0 views

  • The FRCP now treats electronic documents no differently from paper-based documents," explains John LoPorto, executive vice president of sales and marketing for electronic archiving and security provider Privacy Networks. So should corporations, organizations, or schools ever have to participate in a court case involving federal violations such as copyright infringement, sexual harassment, unsafe work environments, or fraud, their e-mails will be considered as possible evidence. "Hence the need to save e-mail," says LoPorto.
  •  
    In response to new federal rules mandating organizations retain their electronic documents, districts are using outside providers to archive their in-house e-mails.
Anne Bubnic

New York State: Scrambling for solutions to cyberbullying - 0 views

  • Both the state Senate and Assembly have proposed anti-cyberbullying laws. Kathy Wilson of Sen. Carl Marcellino's (R-Syosset) office said that the Senate has proposed two bills in the last two years that add computers to the list of modes of illegal harassment, but the Assembly passed neither.The Assembly's website states that the Assembly has proposed bills "to define and prohibit the bullying, cyberbullying and hazing of students and others on school property" as well as to add a database for reporting such complaints, but has not passed either yet.
  • Both the state Senate and Assembly have proposed anti-cyberbullying laws. Kathy Wilson of Sen. Carl Marcellino's (R-Syosset) office said that the Senate has proposed two bills in the last two years that add computers to the list of modes of illegal harassment, but the Assembly passed neither.
  • The Assembly's website states that the Assembly has proposed bills "to define and prohibit the bullying, cyberbullying and hazing of students and others on school property" as well as to add a database for reporting such complaints, but has not passed either yet.
  • ...1 more annotation...
  • Matuk said that the task of monitoring children's electronic activities has been complicated by such devices as iPhones, from which I.M.s can be sent from anywhere. "This is going to require partnership between the schools and the community," he added.
  •  
    Schoolyard bullies are a long-standing problem but now, in the age of the Internet, they are increasingly using electronic devices to torment their victims. Because cyberbullying has become so prevalent, several states, including New York, have proposed legislation to control cyberbullying.
Anne Bubnic

SB 818: Missouri Governor Signs Cyber-Bullying Bill into Law - 0 views

  • The Governor signed the bill at a library in St. Charles County, not far from the neighborhood where a 13-year-old girl, Megan Meier, hanged herself in 2006 after receiving taunting messages over the Internet.  The law was passed after the national outcry that followed the suicide of Meier
  • When the full story came to light, and public demand grew for the mother's prosecution, it turned out that what Ms. Drew had done, while clearly malicious, was not against the law as the Missouri Statutes were then written. So the Missouri Legislature and Governor Blunt decided to correct this problem. The new law adds to unlawful harassment electronic means of communication.
  • The new law penalizes those who knowingly communicate with another person who is, or who purports to be, seventeen years of age or younger and recklessly frightens, intimidates, or causes emotional distress to such other person.  Also, the new law makes it a crime "to engage, without good cause, in any other act with the purpose to frighten, intimidate, or cause emotional distress to another person, cause such person to be frightened, intimidated, or emotionally distressed, and such person's response to the act is one of a person of average sensibilities considering the person's age."
  •  
    On June 30th, Missouri governor, Matt Blunt, signed a bill updating state laws against harassment by removing the requirement in the legislation requiring that such harassing communication be written or made over the telephone. Now, harassment from computers, text messages and other electronic devices may also be considered illegal. The amended law also requires school boards to create a written policy requiring schools to report harassment and stalking committed on school property to local police, including such done via the Internet.
Anne Bubnic

School District Electronic Device Policy - 0 views

  •  
    Texas school district electronic device policy covering use of pagers, cell phones, PDA's, handheld, laptops and similar devices.
Anne Bubnic

The Future of Children: Children and Electronic Media - 0 views

  •  
    Media technology is an integral part of children's lives in the twenty-first century. The world of electronic media, however, is changing dramatically. Television, until recently the dominant media source, has been joined by cell phones, iPods, video games, instant messaging, social networks on the Internet, and e-mail.This volume examines the best available evidence on whether and how exposure to different media forms is linked to child well-being. Contributors to the volume consider evidence for both children and adolescents and consider the quality of the available studies.
Judy Echeandia

Kansas State University Survey Delves into Cyberbullying - 0 views

  • A survey of more than 200 Kansas State University students — mostly freshmen — indicates 54 percent of them believe cyberbullying is a "minor problem" or a "common problem" among students at the university.
  • The survey used the cyberbullying definition provided in Kansas' anti-bullying law, which took effect in January 2008 and was revised in July to include cyberbullying. The law requires schools to develop anti-bullying policies, plans and preventative measures. Cyberbullying is the use of any electronic communication device, such as e-mail, instant messaging, text messages, blogs, mobile phones, pages, online games or Web sites, to create an intimidating, threatening or abusive environment.
  •  
    An online bullying survey was completed by 216 students - 93.7 percent were freshmen- enrolled in the University Experience classes at Kansas State University. The goal of the survey was to determine if bullying behavior followed students from high school into college and how freshmen perceived bullying. The survey used the cyberbullying definition provided in Kansas' anti-bullying law, which took effect in January 2008 and was revised in July to include cyberbullying. The law requires schools to develop anti-bullying policies, plans and preventative measures. Cyberbullying is the use of any electronic communication device, such as e-mail, instant messaging, text messages, blogs, mobile phones, pages, online games or Web sites, to create an intimidating, threatening or abusive environment.
buyglobalshop

Buy Google AdSense Accounts - Best Quality Everything Google AdSense Accounts 2024 - 0 views

  •  
    Google AdSense is a important tool that has revolutionized the way millions of website possessors induce income online. But what exactly is it? In simple terms, Google AdSense is an advertising program by Google that allows website possessors to display targeted advertisements on their spots and earn plutocrat when callers click on those advertisements. It works by using Google's vast network of advertisers who bid for announcement placements on colorful websites. When someone visits a website with AdSense advertisements, Google's algorithms dissect the content of the runner and display applicable advertisements that are most likely to be of interest to the caller. This way, website possessors can monetize their online presence and advertisers can reach a wider followership, creating a mutually salutary arrangement. Buy Google AdSense Accounts How Does Google AdSense Work? Google AdSense is a extensively popular online advertising program that enables website possessors and generators to monetize their content by displaying targeted advertisements on their platforms. But how does Google AdSense actually work? Let's dive into the details. At its core, Google AdSense works by connecting advertisers and website possessors. Advertisers, who are seeking to promote their products or services, produce advertisements through the Google Advertisements platform. These advertisements also suffer a rigorous review process by Google to insure they meet their guidelines and programs. Buy Google AdSense Accounts Website possessors who wish to induce profit from their online content can subscribe up for an AdSense account through the Google AdSense website. Once approved, they gain access to a unique law grain which they can integrate into their website's HTML. This law enables the AdSense program to automatically display applicable and targeted advertisements to their callers. To determine the applicability of the advertisements displayed, Google AdSense utilizes a com
Anne Bubnic

Libraries booking young video gamers - 0 views

  • The American Library Association has announced a new project funded with a $1 million grant from the Verizon Foundation, the charitable branch of Verizon Communications.
  • Libraries that already have mature gaming systems in place will be studied to gauge how electronic games improve players' literacy skills. Then, a dozen leading national gaming experts, including a Tucson librarian, will build a tool kit that libraries across the country can use to develop gaming programs.
  • There's growing evidence that games in general, from the traditional board versions to electronic and online ones, support literacy and 21st-century learning skills, she said, though libraries have been slow to capitalize on them.
  • ...2 more annotations...
  • for the first time ever this year, the American Library Association's annual conference had a gaming pavilion, showcasing efforts to reach a demographic — tweens, teens and 20-somethings — that's tough to pull into the library.
  • Then there's just the overall focus on puzzle-solving, Danforth noted. Unlike books, games often have multiple story lines, depending on decisions that gamers make along the way. In the overall scheme of things, deploying a warrior for one job and a wizard for another isn't that much different from a boss sending an engineer out for one task and a public relations professional for another.
  •  
    If you made a list of sounds you might hear at your local library, the rumbling of explosions and the loud hum of race-car engines probably wouldn't rank high on it. But in a darkened room at the Quincie Douglas Branch Library, about 20 preteens and teens gather around two screens. It's a mostly soundproof room, to make sure their efforts to rack up points on Nintendo's Wii and PlayStation 2 don't bother the consumers of decidedly more static media. It's a sight that could become more frequent at a library near you.
Anne Bubnic

Cell Phone Safety - 0 views

  • The fact that cell phones pose a great risk when combined with driving cannot be of any surprise to anyone. Let’s face it. First, drivers must take their eyes off the road while dialing. Second, people can become so absorbed in their conversations or other cell phone use that their ability to concentrate on the act of driving is severely impaired, jeopardizing the safety of vehicle occupants and pedestrians alike.
  • Time Away from Homework. Technology affords teens (and adults) a host of ways to do something other than what they are supposed to, in this case homework.
  • Mounting Minutes ($$$) Since consumers must be 18 in order to purchase a cell phone contract in the United States, most parents are buying the phones their children carry. This is good news because parents can choose a plan that fits how the cell phone will be used and can review monthly cell phone bills which typically includes a log itemizing phone activity. However, problems still exist. For one, children can quickly go over their allotted minutes for the month which can leave their parents with bills that can easily approach hundreds of dollars for the month.
  • ...1 more annotation...
  • Cell Phones and Gaming According to Sullivan (2004)3, when cellular phone games were simple, such as the knockoffs of the Atari-era "Breakout," there wasn't much to worry about. But newer phones with color displays and higher processing power create a landscape that might make some parents worried about what their kids are playing on the bus home from school.
  •  
    Today's cellular phones (cell phones) are more than just phones, they are hightech appliances that also serve as a mini-computers. Cell phones are electronic gadgets that allow users to surf the web, conduct text chats with others, take photos, record video, download and listen to music, play games, update blogs, send instant text messages to others, keep a calendar and to-do list, and more, much more. But cell phones also carry risks and cause distractions.
Anne Bubnic

Cyberbullying - Bullying Beyond the Schoolyard [New Book] - 0 views

  •  
    Teens and tweens have been bullying each other for generations. The bullies of today, however, have the advantage of utilizing technology such as computers, cell phones and other electronic devices to inflict harm on others. "Bullying Beyond the Schoolyard: Preventing and Responding to Cyberbullying," due out this month, uncovers the types of youth most susceptible, how they felt, who they told, how they coped and how it affected their lives, and illustrates the gravity of cyberbullying and its real-world repercussions. The co-authors, [Justin Patchin, Ph.D. and Sameer Hinduja] both have backgrounds in Criminal Justice and are university-based. Their web site, Cyberbullying.Us is dedicated to identifying the causes and consequences of online harrassment.
1 - 20 of 74 Next › Last »
Showing 20 items per page