Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged employed

Rss Feed Group items tagged

adjustingto6figu

Staying Focused While Self-Employed: 4 Tips for Independent Adjusters - 0 views

  •  
    The freedom of self employment is a perk of being an IA, but there are also challenges. This post gives tips for staying focused while self-employed.
Anne Bubnic

How online predators target children - 0 views

  •  
    One of the most dangerous, insidious aspects of the Internet is the targeting of children by online sexual predators. These criminals employ a series of clever, manipulative tactics to reach out to children in an effort to get them to meet in person. Any parent with children who use the Internet should be aware of the strategies employed by online predators.
adjustingto6figu

Planning for Retirement as an Independent Adjuster - Adjusting to 6 Figures - 0 views

  •  
    An estimated 13% of the American workforce consists of independent contractors, including many independent adjusters. Being self-employed, and/or working under the protection of a business entity such as a Limited Liability Company (LLC), means that you aren't privy to benefits that W2 employees may have. Retirement planning - including employer contributions and the ability to defer your own pay, tax-free - is one of those major benefits. You'll be happy to know, however, that there are retirement planning opportunities for the self-employed (including independent adjusters) that offer similar - if not superior - opportunities.
Anne Bubnic

Cyberbullying Prevention Curriculum Scope & Sequence: GR 6-12 [PDF] - 0 views

  •  
    Developed by the folks who designed the Olweus Bullying Prevention program, this curriculum offers students an opportunity to:
    1. interact, collaborate and publish with peers, experts or others, employing a variety of digital environments and media.
    2.communicate information and ideas effectively to multiple audiences, using a variety of media and formats
    3. contribute to project teams to produce original works or solve problems.
Anne Bubnic

Top 5 Technologies used to Cyberbully - 0 views

  •  
    The following is a list of five technologies currently employed by cyberbullies to intimidate other kids. Learn more about how each tool is used at this site.
    1. MySpace, Facebook and other social networking sites
    2. Instant Messaging
    3. Email
    4. Photoshop
    5. Blogs
Vicki Davis

ThinkQuest - 0 views

  •  
    Excellent organization and competition that is managed very well.
  •  
    This fascinating project needs judges (oh and horizon still does too!) -- hat tip to David Warlick for this link.\n\nThe student web site entries are due in tomorrow (April 2) for the 2008 competition, and ThinkQuest needs people to judge these entries. To be a judge, you must be employed as a teacher or have a minimum of five years experience in the field of education; be proficient in the English language; and be able to, and have the time to evaluate and score websites based on the provided criteria.
Anne Bubnic

Digital Citizenship: Addressing Appropriate Technology Behavior [pdf] - 0 views

  •  
    In this article, Mike Ribble and George Bailey discuss nine areas of digital citizenship and provide strategies for teachers to employ and teach appropriate behavior.
adjustingto6figu

Protect Your Business with the Right Checking Account - 0 views

  •  
    As a self-employed, independent adjuster, one of the first things to do for your business should be setting up a bank account. Most people already have a personal checking account but you should establish yourself the right way with the right checking account. There are a lot of benefits to having a business account but here are some of the top reasons you must have a separate account for your adjusting business.
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • ...3 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Anne Bubnic

High Maintenance : 1:1 Laptop Programs - 0 views

  • FEW DISTRICTS HAVE MORE MILES on their 1-to-1 computing initiatives than Texas' Irving Independent School District, where the teachers have had laptops since 1996 and the current student program began with a pilot launched in 2001. Today, the Irving 1-to-1 program puts close to 12,000 laptops in the hands of students and teachers throughout the district.
  • After nearly a decade, Owen and her team have learned a few things about maintaining 1-to-1 computer programs in K-12 environments. The cornerstone of her strategy: personnel. Owen keeps two technicians on duty at the 1-to-1 high school campuses, and one at every other campus. On top of that, the district employs a central team of five technicians whose job it is to resolve problems that people at the campus level can't handle.
  •  
    Running a successful 1-to-1 program requires diligent upkeep-- along with a few veteran tricks of the trade.
Anne Bubnic

Curbing Cyberbullying in School and on the Web - 0 views

  • Many of the most egregious acts of cyberbullying do not take place during school hours or on school networks, a situation that presents a dilemma for public school administrators: If they punish a student for off-campus behavior, they could get hit with a freedom of speech suit.  If they do nothing, students may continue to suffer and school officials theoretically could get hit with failure to act litigation. For school administrators, it appears to be an unfortunate “catch-22.” For lawyers, it’s a “perfect storm,” pitting freedom of speech advocates against the victims of cyberbullying and schools that try to intervene. There are no easy answers in this arena, few laws, and no well-established precedents that specifically deal with cyberbullying.
  • “School administrators can intervene in cyberbullying incidents, even if the incidents do not take place on school grounds, if they can demonstrate that the electronic speech resulted in a substantial disruption to the educational environment.”
  • These cases illustrate not only a lack of precedent on cyberbullying cases, but also a dilemma for school administrators on how to handle cyberbullying.  “There are few laws that address how to handle cyberbullying, and many schools don’t have an internal policy to deal with cyberbullying that takes place off-campus,” offers Deutchman.  “It may take an unfortunate and tragic event on school property to get more schools to consider tackling electronic behavior that originates off campus.  It’s only a matter of time before a cyberbully, or the victim of cyberbullying, uses deadly force during school hours.”
  • ...5 more annotations...
  • So, what should schools do in the meantime?  First, school officials should establish a consistent internal policy (much like a crisis plan) and a team (minimally made up of the principal, school counselor, and technology director) to deal with cyber-misconduct. This team should fully document disruptive incidents and the degree to which the learning environment is affected. The principal should invite the cyberbully’s parents to review the offending material before considering disciplinary action. Most parents at this point will do the right thing.
  • Second, schools should educate children, starting in elementary school, about the importance of cyber-safety and the consequences of cyberbullying, especially on the school’s own network. These rules should be clearly posted in the computer labs and written in age-appropriate language. The rules should be sent home to parents each year—and they should be posted prominently on the school’s website.
  • Third, teachers should continue incorporating in their curriculum projects that utilize the web and other powerful new technologies. This probably won’t help schools avoid lawsuits; it’s just good pedagogy. It’s not surprising that schools that keep up with the latest technology and software—and employ teachers who care about the quality of online communication—report lower incidents of cyber-misconduct.
  • In addition, schools should update their codes of conduct to include rules that can legally govern off-campus electronic communication that significantly disrupts the learning environment. They should also assign enough resources and administrative talent to deal with students who engage in cyber-misconduct. One very big caveat: Disciplining a student for off-campus electronic speech should be done only as a last resort, and certainly not before seeking legal counsel.
  • Finally, schools should realize that not all cyberbullies need to be disciplined. Schools should act reasonably, responsibly, and consistently—so as to avoid the very bullying behavior they are trying to curb. Until the courts provide clear standards in the area of off-campus electronic speech for young people, these recommendations will go a long way in making schools a safer learning environment for everyone.
  •  
    Most school administrators have more than one story to tell about cyberbullying. They report that victims of cyberbullying experience low self-esteem, peer isolation, anxiety, and a drop in their grades. They note that victims may miss class or other school-related activities. Principals also point to recent high-profile cases where cyberbullying, left unchecked, led to suicide. In response, some schools have created new policies and curbed free speech on the school's computer network and on all electronic devices used during school hours. This article offers practical advice for actions schools can take to curb bullying, ranging from policy development to education.
Anne Bubnic

Many new 'friends' to be made online, but what about dollars? - 0 views

  • Even Google has failed to extend its golden touch to social-networking sites. In 2006 Google paid MySpace $900 million to place ads on its pages. The search giant also operates its own social network, Orkut, which has been growing, especially outside the US. But in a February call with financial analysts, Google cofounder Sergey Brin conceded that the investments “didn’t pan out as well as we had hoped…. I don’t think we have the killer best way to advertise and monetize the social networks yet.”
  • “People clearly, especially on the social networks, [are] not particularly interested in clicking on the ads,” says Mr. Brooks, who as editor of socialnetworkingwatch.com has followed the online industry for a decade. “Advertising needs to evolve, and social networks are forcing this change. People are really tired of being assaulted [by ads], but they still love to buy.”
  • As users share personal information within their networks, companies have an opportunity to capture and employ this data for targeted marketing. Social networks are building huge databases about where users go and the people they connect with, says Fred Stutzman, a doctoral candidate at the University of North Carolina who studies social networks.
  •  
    Social Networks may be on the increase in populations, but marketers still struggle with how to get users to respond to advertising.
Anne Bubnic

Literacy Debate: Online, R U Really Reading? - 0 views

  • hildren like Nadia lie at the heart of a passionate debate about just what it means to read in the digital age. The discussion is playing out among educational policy makers and reading experts around the world, and within groups like the National Council of Teachers of English and the International Reading Association.
  • As teenagers’ scores on standardized reading tests have declined or stagnated, some argue that the hours spent prowling the Internet are the enemy of reading — diminishing literacy, wrecking attention spans and destroying a precious common culture that exists only through the reading of books. But others say the Internet has created a new kind of reading, one that schools and society should not discount. The Web inspires a teenager like Nadia, who might otherwise spend most of her leisure time watching television, to read and write.
  • n fact, some literacy experts say that online reading skills will help children fare better when they begin looking for digital-age jobs.
  • ...3 more annotations...
  • ome children with dyslexia or other learning difficulties, like Hunter Gaudet, 16, of Somers, Conn., have found it far more comfortable to search and read online.
  • Some Web evangelists say children should be evaluated for their proficiency on the Internet just as they are tested on their print reading comprehension. Starting next year, some countries will participate in new international assessments of digital literacy, but the United States, for now, will not.
  • Some traditionalists warn that digital reading is the intellectual equivalent of empty calories. Often, they argue, writers on the Internet employ a cryptic argot that vexes teachers and parents. Zigzagging through a cornucopia of words, pictures, video and sounds, they say, distracts more than strengthens readers. And many youths spend most of their time on the Internet playing games or sending instant messages, activities that involve minimal reading at best.
  •  
    The Future of Reading: Digital Versus Print.
    This is the first in a series of articles that looks at how the Internet and other technological and social forces are changing the way people read.
Anne Bubnic

10 tips for dealing with game cyberbullies and griefers - 0 views

  • Griefers are the Internet equivalent of playground bullies, who find fun in embarrassing and pushing around others.
  • Typical griefer behavior includes: taunting others, especially beginners; thwarting fellow teammates in the game; using inappropriate language; cheating; forming roving gangs with other griefers; blocking entryways; luring monsters toward unsuspecting players; or otherwise using the game merely to annoy a convenient target or to harass a particular player who has reacted to their ill will.
  • , griefers have some gaming companies concerned about losing subscribers. As a result, many game sites and providers are becoming less tolerant of griefers and are employing new methods to police for them and otherwise limit their impact.
  •  
    Known as griefers, snerts, cheese players, twinks, or just plain cyberbullies, chances are one of these ne'er-do-wells has bothered a kid near you at least once while playing online multiplayer video games such as Halo 2, EverQuest, The Sims Online, SOCOM, and Star Wars Galaxies.
adjustingto6figu

Self Employment Tax Tips: 4 Tips for New Independent Adjusters - 0 views

  •  
    Self employment tax tips for independent insurance adjusters in their first year. Self employment taxes don't have to be daunting with these tips.
adjustingto6figu

Financial Management for Independent Adjusters: Tips for Dry Spells - 0 views

  •  
    Financial management for independent adjusters is important but often overlooked. This post gives tips on planning for dry spells.
1 - 19 of 19
Showing 20 items per page