Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged interactive

Rss Feed Group items tagged

JOSEPH SAVIRIMUTHU

Is Twitter the next Second Life? - 0 views

  • Lance Armstrong loves it. Oprah’s all over it. Ashton Kutcher found a million people to follow him on it. Heck, Barack Obama used it to get elected president. So why is Twitter in trouble? According to David Martin, Vice President of Primary Research at Internet traffic monitor Nielsen Online, the site suffers from a retention problem. From month to month, Nielsen data says, just 40 percent of Twitter’s users return to it.
  •  
    Twitter, the microblogging service has been the tech darling of late - racking up new users at a dizzying pace. But there simply aren't enough new users to make up for defecting ones claims one blogger. FaceBook and MySpace, the two social networking giants had double the retention rates Twitter has now. And, as fans are quick to point out in fields of comments around the Web, Facebook offers so many more ways to interact than Twitter.
Anne Bubnic

Test Your Cybersmarts - 0 views

  •  
    Feeling up for a challenge? Then test your cyber smarts with one - or all - of 12 interactive quizzes on everything from spam and spyware to phishing and file-sharing.
  •  
    Feeling up for a challenge? Then test your cyber smarts with one - or all - of 12 interactive quizzes on everything from spam and spyware to phishing and file-sharing.
adina sullivan

Survey: Teens 'sext' and post personal info - 0 views

  •  
    An Internet safety study (PDF) just released by Cox Communications shows that teens may be a bit more safety conscious than previously thought. The survey, which was done by Harris Interactive, asked 655 13- to 18-year-olds about their online and cell phone behavior, specifically addressing issues of cyberbullying and sexting. The study was in partnership with the National Center for Missing & Exploited Children and "America's Most Wanted Host" John Walsh.
Anne Bubnic

My Pop Studio - 0 views

  •  
    My Pop Studio is a creative play experience that strengthens critical thinking skills about television, music, magazines and online media directed at girls. Users select from four behind-the-scenes opportunities to learn more about mass media: My Pop Studio strengthens media literacy skills, promotes positive youth development, and increases knowledge about health issues. Highly interactive creative play activities are used to create an online community that guides users through the process of deconstructing, analyzing and creating media. Video segments, flash animation, media deconstruction games and quizzes, and moderated blogs make the website lively, fun and educational. My Pop Studio was created by a team of researchers and media professionals at the Media Education Lab, located at Temple University's School of Communication.
Brevity Software Solutions Pvt Ltd

ASP .NET Web Application Development Company - 0 views

  •  
    Brevity Software Solutions Pvt Ltd is a ASP .NET Web Application Development Company offering services that includes CMS, eCommerce, Educational Web Apps, Travel Portal Systems, HR Web Apps, Interactive Games, Inventory Management, Non-profit Donation Apps, Transport and Logistics Apps, Online Courses and Training, Discussion Forums, Online Reservations for Ticketing and Booking, Project Management Applications, Social Networking, Web Conference Apps.
Rob Reynolds

Digital Literacy Tour - 16 views

  •  
    The curriculum is designed to be interactive, discussion filled and allow students to learn through hands-on and scenario activities. On this site you'll find a resource booklet for both educators and students that can be downloaded in PDF form, presentations to accompany the lesson and animated videos to help frame the conversation. "
  •  
    Google educator resources on Digital Citizenship.
Anne Bubnic

New Research Study to Examine Teens' Online Behavior - 4 views

  •  
    The Family Online Safety Institute (FOSI) and the Pew Research Center's Internet & American Life Project have agreed to conduct a research project aimed at understanding teenagers' behavior online. The research will examine how this behavior ties to digital citizenship - the behaviors, expectations and skills teens have around interacting with others in digital spaces. The research is jointly funded by the Pew Internet Project and Cable in the Classroom. The study will begin in November 2010 and results are expected in November 2011.
Anne Bubnic

Protecting Your Online Identity and Reputation - 0 views

  • Remember that nothing is temporary online. The virtual world is full of opportunities to interact and share with people around the world. It's also a place where nothing is temporary and there are no "take-backs." A lot of what you do and say online can be retrieved online even if you delete it — and it's a breeze for others to copy, save, and forward your information.
  • Mark your profiles as private. Anyone who accesses your profile on a social networking site can copy or screen-capture information and photos that you may not want the world to see. Don't rely on the site's default settings. Read each site's instructions or guidelines to make sure you're doing everything you can to keep your material private.
  • Safeguard your passwords and change them frequently. If someone logs on to a site and pretends to be you, they can trash your identity. Pick passwords that no one will guess (don't use your favorite band or your dog's birthday; try thinking of two utterly random nouns and mixing in a random number), and change them often. Never share them with anyone other than your parents or a trusted adult. Not even your best friend, boyfriend, or girlfriend should know your private passwords!
  • ...6 more annotations...
  • Don't post inappropriate or sexually provocative pictures or comments. Things that seem funny or cool to you right now might not seem so cool years from now — or when a teacher, admissions officer, or potential employer sees them. A good rule of thumb is: if you'd feel weird if your grandmother, coach, or best friend's parents saw it, it's probably not a good thing to post. Even if it's on a private page, it could be hacked or copied and forwarded.
  • Don't respond to inappropriate requests. Research shows that a high percentage of teens receive inappropriate messages and solicitations when they're online. These can be scary, strange, and even embarrassing. If you feel harassed by a stranger or a friend online, tell an adult you trust immediately. It is never a good idea to respond. Responding is only likely to make things worse, and might result in you saying something you wish you hadn't.
  • Take a breather to avoid "flaming." File this one under "nothing's temporary online": If you get the urge to fire off an angry IM or comment on a message board or blog, it's a good idea to wait a few minutes, calm down, and remember that the comments may stay up (with your screen name right there) long after you've regained your temper and maybe changed your mind.
  • Learn about copyrights. It's a good idea to learn about copyright laws and make sure you don't post, share, or distribute copyrighted images, songs, or files. Sure, you want to share them, but you don't want to accidentally do anything illegal that can come back to haunt you later.
  • Check yourself. Chances are, you've already checked your "digital footprint" — nearly half of all online users do. Try typing your screen name or email address into a search engine and see what comes up. That's one way to get a sense of what others see as your online identity.
  • Take it offline. In general, if you have questions about the trail you're leaving online, don't be afraid to ask a trusted adult. Sure, you might know more about the online world than a lot of adults do, but they have life experience that can help.
  •  
    Advice for teens from www.kidshealth.org. Here are some things to consider to safeguard your online identity and reputation:
    1. Remember that nothing is temporary online
    2. Mark your profile as private.
    3. Safeguard your passwords and change them regularly.
    4. Don't post inappropriate or sexually provocative pictures or comments.
    5. Don't respond to inappropriate requests
    6. Take a breather to avoid "flaming."
    7. Learn about copyrights.
    8. Check your digital footprint.
    9. Take it offline.
Anne Bubnic

Humiliation and gossip are weapons of the cyberbully - 0 views

  • ead teachers are being advised to draw up new rules on mobile phone use amid a growing number of cases of what is now known as “cyber-bullying”. In many secondary schools, over 90% of bullying cases are through text messages or internet chatrooms. It is hoped that the rules about mobile phone use will protect children from abusive texts, stop phones going off in class and prevent mobiles being taken into exam halls.
  • Although the majority of kids who are harassed online aren’t physically bothered in person, the cyber-bully still takes a heavy emotional toll on his or her victims. Kids who are targeted online are more likely to get a detention or be suspended, skip school and experience emotional distress, the medical journal reports. Teenagers who receive rude or nasty comments via text messages are six times more likely to say they feel unsafe at school.
  • The problem is that bullying is still perceived by many educators and parents as a problem that involves physical contact. Most enforcement efforts focus on bullying in school classrooms, corridors and toilets. But given that 80% of adolescents use mobile phones or computers, “social interactions have increasingly moved from personal contact at school to virtual contact in the chatroom,'’ write Kirk R. Williams and Nancy G. Guerra, co-authors of one of the journal reports. “Internet bullying has emerged as a new and growing form of social cruelty.'’
  • ...1 more annotation...
  • Cyber-bullying tactics include humiliation, destructive messages, gossip, slander and other “virtual taunts” communicated through e-mail, instant messaging, chatrooms and blogs. The problem, of course, is what to do about it. While most schools do not allow pupils to use their mobiles in the school building, an outright ban is deemed unworkable. Advances in technology are throwing up new problems for teachers to deal with. Children use their phones to listen to music, tell the time or as a calculator. Cyber-bullies sometimes disclose victims' personal data on websites or forums, or may even attempt to assume the identity of their victim for the purpose of publishing material in their name that defames them or exposes them to ridicule.
  •  
    As more and more people have access to computers and mobile phones, a new risk to youngsters has begun to emerge. Electronic aggression, in the form of threatening text messages and the spread of online rumours on social networking sites, is a growing concern.
Anne Bubnic

Dizzywood Virtual World Enhances Technology Program for Kids - 0 views

  • “Dizzywood’s unique virtual environment offers our kids a wonderful environment in which they can learn important lessons through activities that require thoughtful decision-making. We hope the success of this program offers a model for other youth programs to follow.”  The partnership reinforces the findings of two recent studies of elementary school students conducted by UC Davis. The studies observed that children find ways to transform their experiences with technology into fun, highly organized group activities and that technology-based activities can be explicitly designed to foster social reflection and advanced planning among young children. 
  •  
    Dizzywood, a virtual world and online game for children ages 8-12, today announced that it has been selected by the YMCA of San Francisco to enhance the youth program's technology curriculum. The YMCA is using Dizzywood's virtual environment to reinforce its program emphasis on activities that promote values such as caring, honesty, respect and responsibility. Children also learn about important issues relating to virtual worlds, such as digital citizenship and online safety, as well as complete storytelling and team-building exercises that emphasize creativity, writing and reading skills, and working together to achieve goals. The YMCA program is similar to the elementary school program that Dizzywood recently completed with the Reed Union School District (Marin County, CA). The highly interactive workshop, which ran from April through June, used virtual activities to reinforce the school's character pillars, which include caring, citizenship, fairness, respect, responsibility and trustworthiness, among other core values.
Anne Bubnic

'Video-Gaming' Child Predators Offering Points For Nude Photos - 0 views

  • Maurer is warning parents to take precautions when it comes to gaming consoles because most are hooked to the Internet and anyone can be chatting with children during game play. IBSYS.ad.AdManager.registerPosition({ "iframe": false, "addlSz": "", "element": "ad_N6C0061.2D12", "interstitials": false, "beginDate": "", "endDate": "", "getSect": "", "name": "square", "qString": "", "width": "300", "height": "250", "section": "", "useId": "16995600", "interactive": false, "useSameCategory": false, "topic": "", "swSectionRoot": "", "useZone": "", "type": "DOM" }); "My theory on it is that predators are going to go where kids are, and kids are playing video games so it's a perfect place for them to be," Maurer said.
  •  
    Child predators offering game points in exchange for nude images through Internet-connected video games have prompted a warning for parents. "Kids are playing games, and they are being asked to take photos of themselves naked in order to get game points," state attorney Cybercrime Detective Lt. David Maurer said. "There is not only the chatting version of the games but also a webcam involved."
Anne Bubnic

WEB|WISE|KIDS: MIRROR IMAGE [Interactive Software Adventure] - 0 views

  •  
    3rd in the Cybercop Series. MIRROR IMAGE tells the story of teenagers Sheena and Megan, best friends who are victimized by a criminal who uses the Internet to lure young women with promises of modeling contracts and online romance. Neither of the girls realizes that hacking software has been placed on their computers during their conversations with their 'online boyfriends.' Soon Sheena and Megan begin to suspect that someone is stalking them in real life. Players work with a detective to track the predator and arrest him. Available both as a home edition and a school edition. [Windows and Mac OSX versions available]
Anne Bubnic

WEB|WISE|KIDS: AIRDOGS [Interactive Software Adventure] - 0 views

  •  
    2nd in the CyberCop Series, AIRDOGS was designed to show teenagers that online crimes have lifelong legal and social consequences for teens and their families. In the game, Luke is a teenager who shows great promise as a snowboarder. He needs money for gear and training, so he begins to counterfeit software in his basement. Players collect data and evidence to catch Luke's boss, who is the ringleader of the operation. The message of Air Dogs is clear: theft and extortion are crimes, whether you're 16 or 60. Available both as a home edition and a school edition. [Windows and Mac OSX versions available]
Vicki Davis

YouTube - Please ban cell phone use while driving. - 0 views

  •  
    Discussing proper interaction and safety with digital devices is important.
  •  
    Responsible use of electronic devices is going to become increasingly important because today cell phone is a distraction --- tomorrow it will be in car movies or gps devices. It is the behavior that is the problem and proper focus on real life has to be something we emphasize as we discuss the proper relationship of humans with "gadgets."
Anne Bubnic

Social Networking and Child Protection on the Internet [Report] - 0 views

  •  
    From the UK Home Office Task Force: Best Practices for the providers of social networking and other user interactive services. Download the full Report.

    The first UK Social Networking Guidance provides advice for industry, parents and children about how to stay safe online. This has been developed by a taskforce of representatives from industry, charity and law enforcement agencies including Vodafone, the Child Exploitation and Online Protection Centre (CEOP) and the National Society for the Prevention of Cruelty to Children (NSPCC).

Anne Bubnic

Teachers and Facebook: Privacy vs. standards - 0 views

  • An attorney for a suspended Charlotte-Mecklenburg Schools teacher said Thursday she never intended for the public to view negative comments she made about students on Facebook. But the case is now part of a national debate that pits teachers' right to free expression against how communities expect them to behave.
  • She now faces possible firing for listing “teaching chitlins in the ghetto of Charlotte” among her activities.
  • e district allows teachers to post personal information online, but had to take action because it affected the teacher's ability to interact with students and parents. She called the comments racially insensitive or offensive to students at Thomasboro Elementary School, where she teaches.
  •  
    An attorney for a suspended Charlotte-Mecklenburg Schools teacher said Thursday she never intended for the public to view negative comments she made about students on Facebook. But the case is now part of a national debate that pits teachers' right to free expression against how communities expect them to behave.
Judy Echeandia

Teaching Teenagers About Harassment - 0 views

  • About 20 percent of teenagers have posted or sent nude cellphone pictures of themselves, according to the National Campaign to Prevent Teen and Unplanned Pregnancy, a nonprofit group.
  • digital dating violence.
  • The behaviors can be a warning sign that a teenager may become a perpetrator or a victim of domestic violence, according to the group.
  • ...6 more annotations...
  • teenagers frequently received digital threats or upsetting requests from people they were dating. But the teenagers were not talking about it, did not know how to handle it and did not know what was appropriate and what was not.
  • “It was abuse that there was no protocol around,” Mr. Law said. The parents were not aware of the interactions, and the teenagers did not know how to prevent it, he said.
  • The campaign and its Web site, ThatsNotCool.com, encourage teenagers to set their own boundaries. It is intended to appeal to all teenagers, not just those with serious problems. “The kids don’t want to be told what’s right and what’s wrong,” Mr. Law said. On the site, teenagers can send one of 35 “callout cards” — brightly colored messages they can send by e-mail, post to their Facebook or MySpace accounts or download — that are meant to tell someone they have crossed a line. The messages are sharp. For example: “Congrats! With that last text, you’ve achieved stalker status.”
  • The site offers an area where teenagers can seek advice, like how to stop a boyfriend from nonstop text-messaging. For more direct advice, the site tells teenagers to call or conduct a live chat with trained volunteers.
  • The campaign is digitally focused, reflecting the way teenagers communicate. Even the posters that will appear in schools, which display some of the “callout card” messages, ask viewers to snap a photo with their cellphone and text-message it to someone.
  • All of the communications are aimed at teenagers, not parents. Ms. Soler said the fund was working on a campaign to alert parents to problems, but for now, she wanted to get teenagers discussing them.“We want to give them the tools to say ‘You can have a healthy relationship, and here’s the road map,’ ” Ms. Soler said.
  •  
    A New Ad Warns About Abusive Texting\nA new public service ad highlights the growing problems of "textual abuse," where harassment of children occurs by way of text messages.
Anne Bubnic

Podcasting Music: The legal implications - 0 views

  • Musical works. Performance rights organizations (ASCAP, BMI and SESAC) handle copyright licenses for the performance of musical works, including their performance in a podcast. Separate licenses are necessary from each performance rights organization because each company represents different publishers of composers' musical works. Sound recordings. Copyright licenses for the playing (or "performance") of sound recordings historically have been handled directly with the owners of the works, usually record companies. (Over-the-air broadcasters are not required to obtain copyright licenses for playing sound recordings. They must, however, hold licenses for playing the underlying musical works.)
  • Reproduction. By contrast to webcasting, a podcast may include a reproduction of a sound recording. Podcasting is an interactive activity. It results in the transmission of a sound recording which is fixed and is accessible on demand by the user. The reproduction requires clearances or licenses - for the sound recording, and for the musical work. Although the performance rights societies offer licenses to cover the musical works in a podcast, no uniform or industry-wide licensing scheme has developed yet to cover the sound recording.
  • This leaves the podcaster with three choices: to attempt to obtain licenses from the record companies; to limit podcasts to sound recordings not subject to copyright protection (generally, U.S. recordings pressed before February 15, 1972 [careful: a CD reissue of a pre-1972 recording is a new, protected, sound recording]); or to eliminate sound recordings altogether from podcasts.
  •  
    Copyright law protects musical and spoken compositions, or "works"; the performance of a work preserved in a sound recording; and the sound recording itself. Podcasting implicates these in three ways: the performance of a work; the playing of a sound recording of a performance; and the reproduction of a sound recording by incorporating it into a podcast. The law is well-settled only as to the first of these.
Anne Bubnic

Hectors World [Interactive Games] - 0 views

  •  
    Flash animation games in a aquarium theme from NetSafe.org [New Zealand] that teach kids [Age 5-11] about online privacy and cybersafety. Includes downloadable lesson plans for teachers
Anne Bubnic

How to Use Social-Networking Technology for Learning | Edutopia - 4 views

  •  
    Schools should reflect the world we live in today. And we live in a social world. We need to teach students how to be effective collaborators in that world, how to interact with people around them, how to be engaged, informed twenty-first-century citizens.
« First ‹ Previous 61 - 80 of 95 Next ›
Showing 20 items per page