Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged interest

Rss Feed Group items tagged

Carla Arena

Let's Fight It Together [video] - 0 views

  •  
    I thought this video would REALLY interest you all. moving, appaling. This kid is in our classrooms. via http://thinklab.typepad.com/think_lab/2008/05/you-know-this-k.html
Vicki Davis

Children Online: Getting Younger and Continuing to Take Risks - 0 views

  • 16% posted personal interests 15% posted information about their physical activities 20% gave out their real name 5% posted information about their school 6% posted their home address 6% posted their phone number 9% posted a photograph of themselves
    • Vicki Davis
       
      Again, education is so important of both students and parents.
  •  
    A 2007-2008 research study conducted by Rochester Institute of Technology (RIT) reported several key findings that indicate children are logging on to the Internet at a very young age. Parental supervision of this computer activity, however, is generally lax. Not surprisingly, the study found that children are communicating with friends, peers, and others online in ways that show a lack of knowledge in what is ethical, safe behavior.
Judy Echeandia

Cyberbullying: Parents, Tech Companies Join Forces to Keep Kids Safe - [FOXNews.com - 1... - 0 views

  • Tech companies are releasing new software products that monitor and police kids' Internet use, helping them avoid cyberbullying and letting parents know when it's occurring. Internet monitoring software like CyberBully Alert lets kids notify parents when they're being bullied and takes a screen shot of the computer when a child clicks an alert icon. Programs like CyberPatrol and Spector allow parents to keep tabs on everything kids do on MySpace and Facebook, and keep screen snapshots and a record of what kids write in chat and instant messages.
    • Vicki Davis
       
      Interesting that there is now a program - CyberBully Alert that helps parents protect their children from harrassing behavior.
  • Using these programs, parents can also block Web sites and downloads of movies, music or images. Verizon announced in June that it will begin offering similar free security tools for parents. Internet security software maker Symantec has an online tool it will preview to some parents next month that will notify them by text message when a child attempts to access a forbidden site. The tool, code-named Watchdog until its official release, also lets parents control who is on the child’s buddy list. Symantec offers online tips at its Norton Family Resource Center.
  • software maker CyberPatrol is releasing a series of Internet videos for parents.
  • ...1 more annotation...
  • The best defense, Criddle said, is a strong offense.
  •  
    Tech companies are releasing new software products that monitor and police kids' Internet use, helping them avoid cyberbullying and letting parents know when it's occurring.
Rafael Ribas

What is digital citizenship? (Techlearning blog) - 0 views

  •  
    Quite a lot of ideas on this blog post I bookmarked a while back - a set of interesting questions to ask people, starting with ourselves!
Anne Bubnic

Fact or Folly - For Teachers | Introduction - 0 views

  • But the Internet is different. In most cases it has no such gatekeepers: anyone and everyone can appear to be an "expert." So to get the most out of the Internet, students need to learn two things: first, how to find good information online; and second, how to evaluate the information they find.
  • Using the template The Five Ws of Cyberspace as a guide, young people can examine the authorship, purpose, perspective and presentation of Web sites, in order to determine their credibility.
  • Deconstructing Web Pages provides a step-by-step application of the five Ws to an actual Web site - with some interesting results.
  • ...1 more annotation...
  • And finally, Quick Tips for Authenticating Online Information offers some simple and effective strategies for assessing sites.
  •  
    Anybody can post information on the Internet, making it possible to find "proof" of any ideas or beliefs you can imagine. Yet to many students, "If it's on the Internet, it must be true."
Vicki Davis

SurfTheChannel - 0 views

  •  
    Networks are evolving so that people may customize what is sent to them. Again, the best filter in the world is the human brain and through RSS, people will have access to many things (that will make it through your firewall.) This is an example of a space for TV buffs that is increasing in interest in the entertainment field.
  •  
    This is a website where tv enthusiasts are sharing videos and collaborating. This is an example of how television and all of our entertainment is evolving to become more customized.\n\nIn addition to creating personal learning networks, we will also be creating personal entertainment networks (PEN's) -- all via this amazing thing we call RSS. Understanding RSS is not only important for learning but just living your life.\n\nUser created content is here to stay.
anonymous

Online Predators and Their Victims - 0 views

  • My (Liz B. Davis ) Summary of Key Points (All are quotes directly from the article): Online "Predators" and Their Victims. Myths, Realities, and Implications for Prevention and Treatment. by: Janis Wolak, David Finkelhor, and Kimberly J. Mitchell - University of New Hampshire and Michele L. Ybarra - Internet Solutions for Kids, Inc.
  • The publicity about online"predators" who prey on naive children using trickery and violence is largely inaccurate.
  • adult offenders who meet, develop relationships with, and openly seduce underage teenagers
  • ...21 more annotations...
  • In the great majority of cases, victims are aware they are conversing online with adults. In the N-JOV Study, only 5% of offenders pretended to be teens when they met potential victims online. (112)
  • Offenders rarely deceive victims about their sexual interests.
  • promises of love and romance
  • 99% of victims of Internet-initiated sex crimes in the N-JOV Study were 13 to 17 years old, and none were younger than 12. 48% were 13 or 14 years old. (115)
  • it was those 15-17 years of age who were most prone to take risks involving privacy and contact with unknown people. (115)
  • take place in isolation and secrecy, outside of oversight by peers, family  members, and others in the youth's face-to-face social networks (115)
  • Most of the online child molesters described in the N-JOV Study met their victims in chatrooms. In a 2006 study, about one third of youths who received online sexual solicitation had received them in chatrooms. (116)
  • Youth internet users with histories of offline sexual or physical abuse appear to be considerably more likely to receive online aggressive sexual solicitations. (117)
  • ..Although Internet safety advocates worry that posting personal information exposes youths to online molesters, we have not found empirical evidence that supports this concern. It is interactive behaviors, such as conversing online with unknown people about sex, that more clearly create risk. (117)
  • Online molesters do not appear to be stalking unsuspecting victims but rather continuing to seek youths who are susceptible to seduction. (117)
  • maintaining online blogs or journals, which are similar to social networking sites in that they often include considerable amounts of personal information and pictures, is not related to receiving aggressive sexual solicitation unless youths also interact online with unknown people. (117)
  • Boys constitute 25% of victims in Internet-initiated sex crimes, and virtually all of their offenders are male. (118
  • Some gay boys turn to the internet to find answers to questions about sexuality or meet potential romantic partners, and there they may encounter adults who exploit them. (118)
  • ..child molesters are, in reality, a diverse group that cannot be accurately characterized with one-dimensional labels. (118)
  • Online child molesters are generally not pedophiles. (118)Online child molesters are rarely violent. (119)
  • Child pornography production is also an aspect of Internet-initiated sex crimes. One in five online child molesters in the N-JOV Study took sexually suggestive or explicit photographs of victims or convinced victims to take such photographs of themselves or friends. (120)
  • Youths may be more willing to talk extensively and about more intimate matters with adults online than in face-to-face environments. (121
  • it may not be clear to many adolescents and adults that relationships between adults and underage adolescents are criminal. (122)
  • Simply urging parents and guardians to control, watch, or educate their children may not be effective in many situations. The adolescents who tend to be the victims of Internet-initiated sex crimes many not themselves be very receptive to the advice and supervision of parents. (122)
  • We recommend educating youths frankly about the dynamics of Internet-initiated and other nonforcible sex crimes. Youths need candid, direct discussions about seduction and how some adults deliberately evoke and then exploit the compelling feelings that sexual arousal can induce. (122)
    • anonymous
       
      Let's remember that although there are direct references to gay and male pedophiles of gay boys, that 99% of child sex offenders identify as heterosexual, online or offline.
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
  •  
    This research article has the facts about sexual predatory behavior.
Vicki Davis

Search and Seizure of Cell Phones: Can You Hear Me Now? - 0 views

  • May school officials lawfully “search” the confiscated cell phone to look at stored text messages, photographs, videos, and logs of incoming and outgoing calls? Clearly, the circumstances of the search must satisfy the T.L.O. standard. Not as clear, however, is whether such a search violates federal or Michigan laws regarding stored electronic communications.
  • [A] search of a student by a teacher or other school officials will be ‘justified at its inception’ when there are reasonable grounds for suspecting that the search will turn up evidence that the student has violated or is violating either the law or the rules of the school. Such a search will be permissible in its scope when the measures adopted are reasonably related to the objectives of the search and not excessively intrusive in light of the age and sex of the student and the nature of the infraction.”
  • In Klump v Nazareth Area Sch Dist, 425 F Supp 2d 622 (ED Pa, 2006), a federal district court denied the school’s motion to dismiss a lawsuit filed by a student whose cell phone was searched.
  • ...5 more annotations...
  • compensatory and punitive damages for the alleged unconstitutional search, violation of the Pennsylvania Wiretapping and Electronic Surveillance Control Act, invasion of privacy, and defamation.
  • The court ruled that the student had stated a claim for the alleged violation of his right to be free from an unreasonable search.
  • here was no basis for them to search the text and voice mail messages stored on the phone.
  • unlawful access to the stored voice mail and text message communications.
  • (2) A person shall not willfully and maliciously read or copy any message from any telegraph, telephone line, wire, cable, computer network, computer program, or computer system, or telephone or other electronic medium of communication that the person accessed without authorization. (3) A person shall not willfully and maliciously make unauthorized use of any electronic medium of communication, including the internet or a computer, computer program, computer system, or computer network, or telephone.
  •  
    Legal Implications for Searching Student Cell Phones. Although this article is written against Michigan law, it does help clarify some of the concepts for what is permissable. Note that searching a student's cell phone or wireless device without parent permission may violate state wiretapping laws.
  •  
    Confiscating and looking at information on cell phones by school officials is still not clear. This is a very interesting case study for those working with digital citizenship issues at their school.
  •  
    Fascinating article explaining Michigan take on searching and confiscating cell phones.
Anne Bubnic

Three Important Lessons Banning Cell Phones Teaches Kids - 1 views

  •  
    Teachable moment: In addition to the three important lessons, the teacher guided students through a process of creating and posting their own version of appropriate rules for cell phones in school. Over five dozen student comments are posted. Interesting stuff.
Anne Bubnic

Understanding Digital Citizenship - 4 views

  • it seems that digital citizenship is about using technology appropriately, and not misusing or abusing technology.
  • The item I am most interested in is the “digital rights and responsibilities”. Up until now, most of what I have seen related to digital citizenship relates only to safety, literacy and etiquette and the strategies we use in teaching these to children.
  • A fully literate citizen is at once critically self-reflexive and critically reflexive of his/her collective and position within it.
  • ...1 more annotation...
  • I can say that digital citizenship can be extended to include; 1) A responsibility to critical interpret our place in the collective, especially in terms of power, authority, influence and position, and 2) An obligation toward bettering our (digital) communities through critical, ethical and moral decision-making.
  •  
    Brilliant and meaty post from Alex Couros about what "digital citizenship" encompasses and really means for pedagogy.
Anne Bubnic

Calculate your daily digital footprint [Tool] - 3 views

  •  
    This tool calculates the size of your daily digital footprint based on types, frequency and quantities of technology usage. Might make an interesting exercise for kids, paired with a lesson on personal identity online etc. Their answers might be quite different from adults.
jason ohler

Digital citizenship and character education - 3 views

I thought readers might be interested in my article about digital citizenship and character education, in the new issue of Educational Leadership. It echoes a number of points from my book, Digital...

citizenship character education digital literacy

started by jason ohler on 25 Feb 11 no follow-up yet
Anne Bubnic

Twenty-Two Interesting Ways to use Twitter in the Classroom - 0 views

  •  
    Another fine presentation by Tom Barrett
Anne Bubnic

Teachers Driving Web 2.0 Use in Schools Says National Research Survey - 0 views

  • The research indicates that the movement toward Web 2.0 use to engage students and address individual learning needs is largely being driven in districts from the bottom up – starting with teachers and students
  • Overall, the research confirms school districts are using or planning to use several types of Web 2.0 technologies, but reveals there is still resistance to using online social networking for instructional purposes.
  • ther key results of the survey include: The three most frequently cited reasons for adopting Web 2.0 technologies are: addressing students’ individual learning needs, engaging student interest, and increasing students’ options for access to teaching and learning. Online communications with parents and students (e.g., teacher blogs) and digital multimedia resources are the Internet technologies most widely used by teachers, and a majority of districts have plans for adopting these technologies or promoting their use. Teacher-generated online content (e.g., multimedia lessons, wiki-based resources) is likely to be the next area of growth in the use of Web 2.0 technologies. Almost half of districts have plans for adopting or promoting the creation and sharing of this content through Web 2.0 tools.
  • ...1 more annotation...
  • Over the next several months, the companies will conduct online focus groups, prepare a white paper summarizing and interpreting the research, and develop resources based on the insights learned to help guide districts in harnessing the educational power of the collaborative Web
  •  
    While many stakeholders are involved in developing policies on the use of Web 2.0 technologies in K-12 education, new research suggests that teachers are the most important group driving adoption. This is a major finding from a national research survey of more than 500 district technology directors. The survey was commissioned by Lightspeed Systems Inc., a leader in network security and management software for schools, and Thinkronize Inc., creators of netTrekker, America's number one educational search tool, with support from Atomic Learning.
JOSEPH SAVIRIMUTHU

Cybersmart Detectives [Game] - 0 views

  • Cybersmart Detectives is an innovative online game that teaches children key internet safety messages in a safe environment. Children work online in real time liaising with community professionals to solve an internet-themed problem. The activity is based in the school environment, and brings together a number of agencies with an interest in promoting online safety for young people, including State and Federal Police, internet industry representatives and child welfare advocates. In the scenario, children play the role of a school Deputy Principal concerned about the welfare of a new student, who may be being bullied by someone they have met in an internet chat room. Guided by a series of clues, children work collaboratively in teams to solve the mystery of what is worrying the student, and why. 'Cybersmart Guides' respond to the questions and theories posed by the students, and guide the teams through each of the 'clues'. As the scenario unfolds, the children discuss the risks of certain online and offline behaviours, and ways of managing those risks. Although the scenario presented in the activity is simulated, the sense of urgency that excites a class of children taking part is very real. By the end of the activity children will have learned some valuable lessons about some of the risks associated with internet use, especially useful tips for chatting safely online. More importantly, the issues that lie behind the story will have been discussed with professionals who deal with similar issues on a daily basis. Cybersmart Detectives was initially developed by UK-based child advocacy agency Childnet International, and until 2005, operated under the name of Net Detectives. The activity is now independently operated by E-ngagelive. The Australian Communications and Media Authority ( ACMA ), by agreement with E-ngagelive , has adapted the activity for use in Australian schools under the name Cybersmart Detectives.
  •  
    Another example of emerging norms focussed on empowerment of children, this game is played online and accessible only to students in the United Kingdom.
Anne Bubnic

Who's Keeping Students Safe Online? - 0 views

  • Fewer than 25 percent of educators feel comfortable teaching students how to protect themselves from online predators, cyberbullies and identity thieves, says a new study from the National Cyber Security Alliance (NCSA) and Educational Technology, Policy Research and Outreach (ET PRO).
  • The study found that 90 percent of educators have received fewer than six hours of professional development on cybersecurity over the past year but that more than 60 percent are interested in learning more about cybersecurity, or C3, issues, with cybersafety rated as their highest priority.
  •  
    Fewer than 25 percent of educators feel comfortable teaching students how to protect themselves from online predators, cyberbullies and identity thieves, says a new study from the National Cyber Security Alliance (NCSA) and Educational Technology, Policy Research and Outreach (ET PRO).
Anne Bubnic

Are Kids Different Because of Digital Media? - 0 views

  •  
    We use this video frequently as an introduction at teacher trainings. The MacArthur Foundation is exploring how technology is changing kids and learning, committing $50 million to this initiative.
  •  
    It will be most interesting to see whether the next generation of kids brought up by the Digital Generation will be any different.
Kevin Rose

Same Day Short Term Loans To Make Process Faster And Easiest Way - 0 views

Same Day Short Term Loans are fully hassling essential for you when you require rapid funds very urgently without any bother of lower credit. These financial services are provided lower rate of int...

fast short term loans quick loans bad credit loans same day loans payday loans same day payday loans short term loans fast loans

started by Kevin Rose on 24 Feb 16 no follow-up yet
« First ‹ Previous 81 - 100 of 117 Next ›
Showing 20 items per page