Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged is

Rss Feed Group items tagged

wasifali

Nama j2 juicer - 0 views

Nama j2 juicer Are you in search of a high-quality juicer machine that can take your health and wellness to the next level? Look no further than the Nama J2 Juicer Machine, available now at Costco....

nama j2 juicer costco

started by wasifali on 30 Apr 23 no follow-up yet
wasifali

Nama j2 juicer - 0 views

Nama j2 juicer Are you in search of a high-quality juicer machine that can take your health and wellness to the next level? Look no further than the Nama J2 Juicer Machine, available now at Costco....

nama j2 juicer costco

started by wasifali on 30 Apr 23 no follow-up yet
wasifali

JBL speakers - 0 views

JBL is a renowned brand in the audio industry, known for producing high-quality speakers that are perfect for home entertainment systems, music production, and even live performances. From wireless...

jbl speakers

started by wasifali on 17 May 23 no follow-up yet
wasifali

Nama j2 juicer - 0 views

Nama j2 juicer Are you in search of a high-quality juicer machine that can take your health and wellness to the next level? Look no further than the Nama J2 Juicer Machine, available now at Costco....

nama j2 juicer costco

started by wasifali on 17 May 23 no follow-up yet
buyverifiedets

Buy Verified Cash App Accounts - 100% Verified BTC Enable - 0 views

  •  
    Buy Verified Cash App Accounts Introduction Similar to Venmo, Cash App is a peer-to-peer payment tool that lets users transfer funds to and from loved ones. The program is accessible on both iOS and Android smartphones, and there are no fees associated with sending or receiving money. Buy Verified Cash App Accounts What Is Cash App Accounts? Similar to Venmo, Cash App is a peer-to-peer payment tool that lets users transfer funds to and from loved ones. The program is accessible on both iOS and Android smartphones, and there are no fees associated with sending or receiving money.
  •  
    Introduction Similar to Venmo, Cash App is a peer-to-peer payment tool that lets users transfer funds to and from loved ones. The program is accessible on both iOS and Android smartphones, and there are no fees associated with sending or receiving money. Buy Verified Cash App Accounts What Is Cash App Accounts? Similar to Venmo, Cash App is a peer-to-peer payment tool that lets users transfer funds to and from loved ones. The program is accessible on both iOS and Android smartphones, and there are no fees associated with sending or receiving money.
Anne Bubnic

The Newest Breed of Bully, the Cyberbully - 0 views

  • While some of what is published online may seem libelous (i.e., intended to harm the reputation of another), proving that point can be difficult and expensive. In order to prove libel, you have to prove malicious intent, something that might prove difficult if the offending Web page was put up by an adolescent. And many times, freedom of speech wins out.
  • Unless an actual crime has taken place, law enforcement officials often are unable to arrest anyone, even if they can identify the culprit. According to Lt. John Otero, commanding officer of the computer crime squad for the New York City Police Department, individuals would actually have to post a direct threat in order for the police to act. "For example, if they say, 'tomorrow I am going to hurt, kill, or injure an individual,' that would constitute a crime," he explains. A person posting such a threat could be arrested and charged with aggravated harassment. Although Otero says his department has seen some arrests, anyone under the age of 18 would not be dealt with harshly: "If the kid is too young, he would get a scolding and the incident would be brought to the parents' attention; if they are under 16, they are considered minors."
  • Like cliques, cyberbullying reaches its peak in middle school, when young adolescents are trying to figure out who their friends are and whether they fit in. "Third- and 4th-graders are just having fun with computers," says Loretta Radice, who taught computer skills to middle-schoolers in public and private schools for more than 15 years.
  • ...1 more annotation...
  • While the cyber- bully believes he cannot be caught, Radice notes that everyone leaves footsteps in cyberspace. "Everything is traceable," she says. "Kids often don't realize that."
  •  
    Because cyberbullying is such a new phenomenon, school and law enforcement officials in the United States and other countries are still sorting out the legal technicalities. "Most of what is done online is protected as free speech," says Frannie Wellings, policy fellow at the Electronic Privacy Information Center in Washington, DC.
Vicki Davis

YouTube - Please ban cell phone use while driving. - 0 views

  •  
    Discussing proper interaction and safety with digital devices is important.
  •  
    Responsible use of electronic devices is going to become increasingly important because today cell phone is a distraction --- tomorrow it will be in car movies or gps devices. It is the behavior that is the problem and proper focus on real life has to be something we emphasize as we discuss the proper relationship of humans with "gadgets."
Anne Bubnic

Privacy is Not Dead, Just Evolving - 2 views

  •  
    It's a brave new world. Unfortunately--continuing the literary allusion--Big Brother is watching. As technology makes more information more accessible, it also threatens to expose information that is not intended to be shared. Privacy is a concept that is caught in the middle of the struggle.
Anne Bubnic

ChatRoulette: Devil Incarnate or Accessible Public? - 1 views

  • Don't get me wrong: There is a high probability that you will run into the seedier side of the site in a matter of moments.  Some have argued that ~10% of the site's users are exposing themselves or their genitals through the site.  And, unlike pornographic spam, these exhibitionists are typically male.  
  •  
    It's easy to see new Internet phenomena and panic, especially when the technology in question opens up a portal to all of the weird parts of the Internet. This is precisely what is happening around ChatRoulette, a new peer-to-peer webcam-based video chat site. Although the site was built by a 17-year-old Russian high school student to connect with other teens, nearly every adult who has visited the site runs screaming that this is a terrible space for young people. In some senses, they're right. But the more that they panic and talk about how bad this is for teens, the more teens get curious and want to check it out. The result? A phenomenon generated through fear.
Anne Bubnic

Chatroulette: What's an Educator to Do? - 2 views

  • You never know who you are going to encounter: a predator? Someone sitting there naked?” asks Barnett. “All it would take is one such incident and the school will be sued by an angry parent. Our focus should be on helping students to learn to be cyber safe and we don't have to do that by actually being on Chatroulette.com.”
  •  
    On listservs and blogs, education researchers and teachers are beginning to discuss how to handle this latest online application. To most educators, filtering is never a preferred option. Teachers and media specialists almost uniformly choose to use opportunities like this to teach students how to make decisions about what's appropriate on their own. "One of the responsibilities of working with students on the use of online resources is to make them aware of potential dangers so they can make informed choices," says Deb Logan, librarian and media specialist for Mount Gilead (OH) High School, by email. "A discussion of online resources like Chatroulette offers a learning opportunity. These opportunities sometimes come at unexpected times." But educators believe Chatroulette may be a bit different then other similar sites like Omegle.com and Facebook's PopJam in that video is involved-and there's no way to edit what pops up on the screen other than clicking "next" after it's already appeared. There's no lurking allowed on Chatroulette-once a user signs in, they're visible to anyone who chances upon them, and anyone, in turn, is visible to them. Needless to say, there's a bit of nudity and sexual play being reported on the site, and the swiftness of people moving from image to image doesn't allow children to protect themselves-other than signing off.
buyglobalsmm21

Buy Wechat Account-- 100% Fully Verified & cheap... - 0 views

  •  
    Buy Wechat Account Looking to Buy Wechat Account? We 've got you covered! WeChat is a revolutionary messaging service that has taken the world by storm. It allows druggies to shoot unlimited dispatches and make videotape calls, giving it an edge over traditional messaging services. One of the main advantages of using Wechat is that druggies can buy an account to pierce all of these services. By buying a WeChat account, druggies get access to all of the features without having to produce a new bone . Order now and see the results for yourself And get further exposure for your business! All the benefits you'll get from our service √. 100 guests Satisfaction Guaranteed. √. veritably Cheap Price. √. High- Quality Service. √. 100 Money- Back Guarantee. √.24/7 Ready to client Support. √. Extra lagniappes for every service. √. still, you must Advance Payment, If you want to buy this product.
  •  
    Buy Wechat Account Introduction Microblogging platform WeChat offers a unique opportunity for businesses to connect with potential customers. A WeChat account allows businesses to set up a presence on the platform and share updates, articles, and promotions with users. Why do they buy WeChat? When talking about why people buy WeChat, there are a few different reasons. The most common one is because WeChat is a Chinese app, and a lot of people who are not from China want to use it to communicate with friends or family who live in China. Another reason is that WeChat is a very convenient app that offers a lot of features, such as messaging, calling, and even payments. Finally, some people may buy WeChat because it is becoming more and more popular, and they want to be part of the trend. We chat accounts unlimited sell low price Are you interested in purchasing a WeChat account? You're in luck! We're here to sell you a WeChat account for a low, low price! WeChat is a messaging and social media app that's monstrously popular in China. It has over 1 billion active monthly users, making it one of the most popular messaging apps in the world. WeChat is much more than just a messaging app though - it also offers a variety of features such as payment options, news updates, and much more. If you're interested in purchasing a WeChat account, then you've come to the right place. We offer WeChat accounts for sale at a very low price, so you can get started using this incredibly popular app without breaking the bank. WeChat accounts come with a variety of features, so you can customise your account to suit your needs. Whether you're looking for a messaging app with a built-in payment system, or you want to keep up with the latest news and information from China, WeChat has you covered. So what are you waiting for? Get started using WeChat today by purchasing an account from us. We promise you won't be disappointed! Wechat Account Sell 3 year old account A
itgmbshop

Buy Facebook Ads Account/Verified Facebook Business Manager - 0 views

  •  
    Buy Facebook Ads Account In the digital age, Facebook Ads has advanced into an essential device for both corporations and those striving to increase their on-line presence, power targeted website traffic, and generate valuable leads. With its modern-day advertising and advertising platform, Facebook gives an array of focused on options, modern advert codecs, and analytical tools that permit users to extraordinary-music their advertising techniques and gather their dreams. The platform's versatility permits advertisers to achieve specific demographics, check diverse ad creatives, and take a look at ordinary standard overall performance metrics to optimize their campaigns. Despite these blessings, the approach of handling Facebook Ads campaigns may be complicated, disturbing meticulous making plans and execution to navigate successfully. This complexity often leads marketers to are searching out more streamlined solutions. For those trying to simplify their advertising and marketing and advertising and advertising efforts, buying a Facebook Ads account gives a compelling possibility. Acquiring an established account can provide a whole lot of blessings, consisting of at once get proper of entry to to a records of advert performance and a integrated music record of compliance with Facebook's tips. An cutting-edge account often comes with a treasured repository of statistics and insights that could boost up marketing advertising marketing campaign setup and execution. This may be in particular satisfactory for modern day advertisers or those seeking out to brief scale their efforts with out the need to gather an account's records from scratch. By leveraging an account with a installed basic overall performance history, businesses can avoid some of the common pitfalls related to beginning anew and probably gain from a head start in attaining their advertising dreams. However, the technique of buying a Facebook Ads accountis not with out its dangers and concerns
Steven Knight

The Door That's Not Locked - 8 views

  •  
    The web is a wonderful place, if you understand the dangers. While the Internet is an open door to a world of great information, communication and entertainment, it can also be a direct passageway to danger. The Canadian Centre is committed to helping parents, teachers, and anyone else who would like to better understand the good, bad, and ugly about the web. We're here to help keep kids safe while exploring and enjoying The Door that's not Locked. This website has been created to provide you with a one-stop-shop on all things related to Internet safety.
  •  
    All Web. No Net.
  •  
    This is a great site. No nonsense advice. I really like how it is broken down in age groups, which helps you to understand how children become more sophisticated in their Internet use. Thanks Steve for sharing it!
Anne Bubnic

Protecting Your Online Identity and Reputation - 0 views

  • Remember that nothing is temporary online. The virtual world is full of opportunities to interact and share with people around the world. It's also a place where nothing is temporary and there are no "take-backs." A lot of what you do and say online can be retrieved online even if you delete it — and it's a breeze for others to copy, save, and forward your information.
  • Mark your profiles as private. Anyone who accesses your profile on a social networking site can copy or screen-capture information and photos that you may not want the world to see. Don't rely on the site's default settings. Read each site's instructions or guidelines to make sure you're doing everything you can to keep your material private.
  • Safeguard your passwords and change them frequently. If someone logs on to a site and pretends to be you, they can trash your identity. Pick passwords that no one will guess (don't use your favorite band or your dog's birthday; try thinking of two utterly random nouns and mixing in a random number), and change them often. Never share them with anyone other than your parents or a trusted adult. Not even your best friend, boyfriend, or girlfriend should know your private passwords!
  • ...6 more annotations...
  • Don't post inappropriate or sexually provocative pictures or comments. Things that seem funny or cool to you right now might not seem so cool years from now — or when a teacher, admissions officer, or potential employer sees them. A good rule of thumb is: if you'd feel weird if your grandmother, coach, or best friend's parents saw it, it's probably not a good thing to post. Even if it's on a private page, it could be hacked or copied and forwarded.
  • Don't respond to inappropriate requests. Research shows that a high percentage of teens receive inappropriate messages and solicitations when they're online. These can be scary, strange, and even embarrassing. If you feel harassed by a stranger or a friend online, tell an adult you trust immediately. It is never a good idea to respond. Responding is only likely to make things worse, and might result in you saying something you wish you hadn't.
  • Take a breather to avoid "flaming." File this one under "nothing's temporary online": If you get the urge to fire off an angry IM or comment on a message board or blog, it's a good idea to wait a few minutes, calm down, and remember that the comments may stay up (with your screen name right there) long after you've regained your temper and maybe changed your mind.
  • Learn about copyrights. It's a good idea to learn about copyright laws and make sure you don't post, share, or distribute copyrighted images, songs, or files. Sure, you want to share them, but you don't want to accidentally do anything illegal that can come back to haunt you later.
  • Check yourself. Chances are, you've already checked your "digital footprint" — nearly half of all online users do. Try typing your screen name or email address into a search engine and see what comes up. That's one way to get a sense of what others see as your online identity.
  • Take it offline. In general, if you have questions about the trail you're leaving online, don't be afraid to ask a trusted adult. Sure, you might know more about the online world than a lot of adults do, but they have life experience that can help.
  •  
    Advice for teens from www.kidshealth.org. Here are some things to consider to safeguard your online identity and reputation:
    1. Remember that nothing is temporary online
    2. Mark your profile as private.
    3. Safeguard your passwords and change them regularly.
    4. Don't post inappropriate or sexually provocative pictures or comments.
    5. Don't respond to inappropriate requests
    6. Take a breather to avoid "flaming."
    7. Learn about copyrights.
    8. Check your digital footprint.
    9. Take it offline.
Anne Bubnic

Cyber Bullying: A Prevention Curriculum for Grades 6-12 [Book] - 1 views

  •  
    Cyber Bullying: A Prevention Curriculum for Grades 6-12 is a curriculum that deals with attitudes and behaviors associated with cyber bullying. This eight-session curriculum is designed to:
    1. Raise student and parent awareness of what cyberbullying is and why it is so harmful
    2. Equip students with the skills and resources to treat eachother respectfully when using cybertechnologies
    3. Give students information about how to get help if they, or others they know, are being cyber bullied
    4. Teach students how to use cyber technologies in positive ways.
Anne Bubnic

Counteracting Cyberbullying Inside/Outside of School Grounds - 0 views

  • The problem is that most incidents of cyberbullying occur off-campus because students have more unsupervised time. But the impact is at school where students are physically together. Although there is no data on the extent of harmful impact, anecdotally, it is clear that some incidents lead to students avoiding or even failing school, committing suicide and even becoming violent.
  • Studies on cyberbullying reported in the December 2007 issue of Journal of Adolescent Health reveal that both perpetrators and targets of cyberbullying report significant psychosocial concerns and increased rates of involvement in offline physical and relational aggression
  • One study reported that the victims of cyberbullying were eight times more likely than other students to report bringing a weapon to school. The concerns for student safety are very real. Students who do not believe school officials can help them may seek their own revenge or refuse to come to school.
  •  
    Do school officials have the authority to impose discipline in response to harmful off-campus online speech? Should they? This is a major challenge facing school administrators today. Many state legislatures are now adding statutory provisions requiring schools to incorporate cyberbullying into bullying prevention policies. But this has presented some concerns. For example, in Oregon and Washington, language incorporated into cyberbullying legislation appears to restrict administrators from responding to any off-campus bullying regardless of the harmful impact on campus. Administrators from these two states are advised to check with their legal council. Administrators in other states should understand that the American Civil Liberties Union is trying to use language in the cyberbullying statutes to override federal case law and restrict administrators from doing anything in response to off-campus harmful speech.
Anne Bubnic

Humiliation and gossip are weapons of the cyberbully - 0 views

  • ead teachers are being advised to draw up new rules on mobile phone use amid a growing number of cases of what is now known as “cyber-bullying”. In many secondary schools, over 90% of bullying cases are through text messages or internet chatrooms. It is hoped that the rules about mobile phone use will protect children from abusive texts, stop phones going off in class and prevent mobiles being taken into exam halls.
  • Although the majority of kids who are harassed online aren’t physically bothered in person, the cyber-bully still takes a heavy emotional toll on his or her victims. Kids who are targeted online are more likely to get a detention or be suspended, skip school and experience emotional distress, the medical journal reports. Teenagers who receive rude or nasty comments via text messages are six times more likely to say they feel unsafe at school.
  • The problem is that bullying is still perceived by many educators and parents as a problem that involves physical contact. Most enforcement efforts focus on bullying in school classrooms, corridors and toilets. But given that 80% of adolescents use mobile phones or computers, “social interactions have increasingly moved from personal contact at school to virtual contact in the chatroom,'’ write Kirk R. Williams and Nancy G. Guerra, co-authors of one of the journal reports. “Internet bullying has emerged as a new and growing form of social cruelty.'’
  • ...1 more annotation...
  • Cyber-bullying tactics include humiliation, destructive messages, gossip, slander and other “virtual taunts” communicated through e-mail, instant messaging, chatrooms and blogs. The problem, of course, is what to do about it. While most schools do not allow pupils to use their mobiles in the school building, an outright ban is deemed unworkable. Advances in technology are throwing up new problems for teachers to deal with. Children use their phones to listen to music, tell the time or as a calculator. Cyber-bullies sometimes disclose victims' personal data on websites or forums, or may even attempt to assume the identity of their victim for the purpose of publishing material in their name that defames them or exposes them to ridicule.
  •  
    As more and more people have access to computers and mobile phones, a new risk to youngsters has begun to emerge. Electronic aggression, in the form of threatening text messages and the spread of online rumours on social networking sites, is a growing concern.
Anne Bubnic

Is Facebook's redesign aimed at Silicon Valley, not everywhere else? - 0 views

  •  
    Facebook has finally started integrating its new redesign into its main site. The company is betting that what users want to do is publish more information about themselves, and see more about their friends activities. The thing is, do most Facebook users actually want to do those things?
Rafael Ribas

Google advice to students: Major in learning - 0 views

  • It's easy to educate for the routine, and hard to educate for the novel.
  • learning doesn't end with graduation.
  •  
    Job characteristics and strengths at work at Google -
    \n\n... analytical reasoning. Google is a data-driven, analytic company. When an issue arises or a decision needs to be made, we start with data. That means we can talk about what we know, instead of what we think we know.
    \n\n... communication skills. Marshalling and understanding the available evidence isn't useful unless you can effectively communicate your conclusions.
    \n\n... a willingness to experiment. Non-routine problems call for non-routine solutions and there is no formula for success. A well-designed experiment calls for a range of treatments, explicit control groups, and careful post-treatment analysis. Sometimes an experiment kills off a pet theory, so you need a willingness to accept the evidence even if you don't like it.
    \n\n... team players. Virtually every project at Google is run by a small team. People need to work well together and perform up to the team's expectations.\n\n... passion and leadership. This could be professional or in other life experiences: learning languages or saving forests, for example. The main thing, to paraphrase Mr. Drucker, is to be motivated by a sense of importance about what you do.
Vicki Davis

"Unprecedented Force for Change"-Dan Tapscott's Keynote - Horizon Project 2008 - 0 views

  • Teachers are no longer “transmitters of data,” but active participants in the student’s learning process.
    • Vicki Davis
       
      I think this comment is an important one to understand as we advocate for Student success as well.
  • with our advanced, technological world, we must not only acknowledge the new technologies emerging but we must gain knowledge on how to use them.
  • f school became an interactive place where both students and teachers put their two cents in: teachers teaching students, students teaching students, teachers sharing ideas and students executing these ideas-school would be great. If we all focus on change and ways to make interactive learning better we could reach so many people! Not only can we interact with each other but we can raise awareness and pose solutions on the many issues regarding education.
  • ...2 more annotations...
  • I really agree with both of what you two are saying, but my question remains, (in an attempt not to sound too cynical): how is this going to happen? I know that Dan Tapscott seeks to view change in the education system, but my question is, how is this going to happen?
  • but the real issue is, in so many places education is rigid and all about regurgitation of information. How do we look past that? Is it a mindset that we need to learn how to transgress, or is it a gradually changing aspect?
« First ‹ Previous 41 - 60 of 1377 Next › Last »
Showing 20 items per page