Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged major

Rss Feed Group items tagged

Anne Bubnic

'Sexting' lands teen on sex offender list - 0 views

  • Phillip Alpert found out the hard way. He had just turned 18 when he sent a naked photo of his 16-year-old girlfriend, a photo she had taken and sent him, to dozens of her friends and family after an argumen
  • t was a stupid thing I did because I was upset and tired and it was the middle of the night and I was an immature kid," says Alpert.
  • Orlando, Florida, police didn't see it that way. Alpert was arrested and charged with sending child pornography, a felony to which he pleaded no contest but was later convicted. He was sentenced to five years probation and required by Florida law to register as a sex offender.
  • ...3 more annotations...
  • Rather than force her daughter to take the classes, which would have required she write a report explaining why what she did was wrong, Miller and two other families ­-- with the help of the ACLU -- are suing the district attorney to stop him from filing charges. "We believe she was the victim and that she did nothing wrong," says Miller. "How can I ask her to compromise her values and write this essay, when she didn't do anything?" Although the district attorney maintains the program is voluntary, the letter he sent to parents notes, "Charges will be filed against those who do not participate." Seventeen of the 20 students caught in the sexting incidents have completed the 14 hours of classes.
  • Last year, Jessica Logan, a Cincinnati, Ohio, teen, hanged herself after her nude photo, meant for her boyfriend, was sent to teenagers at several high schools
  • No charges had been filed against Jessica's 19-year-old boyfriend, who disseminated the photo, nor had the school taken any action, Logan says. He says he and his wife want to warn parents and students of the dangers of sexting. The Logans are fighting to raise awareness nationally and to advocate for laws that address sexting and cyber-bullying.
  •  
    The National Campaign to Prevent Teen & Unplanned Pregnancy, a private nonprofit group whose mission is to protect children, and CosmoGirl.com, surveyed nearly 1,300 teens about sex and technology. The result: 1 in 5 teens say they've sexted even though the majority know it could be a crime.
Anne Bubnic

Summer Photo Contest for Kids - Capturing spirit of biodiversity - 0 views

  •  
    National Geographic, Airbus, and ePals have partnered to raise awareness of biodiversity worldwide, especially among young people. A major component of this effort is a summer photo contest for students age 6-16, called "See the Bigger Picture". Students can submit digital photos online or via mailed electronic media until September 8th. The contest is open to kids aged between 6 and 16.
Devia Rajput

In All Over The World Top 10 states with major Gold Funds - 0 views

  •  
    Hi Friends today i'll explain you about the largest gold fund top 10 countries all over the world.Gold is a costly metal that has always been consider as a safe savings. Though gold prices have fallen from the start of 2013, it has always caught everyone's interest. Over the past few years, the prices have better than before terribly. Irrespective of its price, insist for gold is always far above the ground.
yc c

Digital Attack Map - 0 views

  •  
    Digital Attack Map One of the easiest ways to silence someone online is a distributed denial of service attack (DDoS). But it's difficult to solve a problem you can't see. Digital Attack Map visualizes the most powerful DDoS attacks happening in the world right now, using data from our partner Arbor Networks. DDoS attacks sometimes relate directly to events in the real world such as conflicts or political disputes. A Distributed Denial of Service (DDoS) attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. They target a wide variety of important resources, from banks to news websites, and present a major challenge to making sure people can publish and access important information.
adjustingto6figu

Insurance Adjuster Work From Home: Setting Up Your Home Office - 1 views

  •  
    Insurance adjuster work from home is a major perk of being an IA. This post gives tips for setting up the perfect home office for your IA work.
adjustingto6figu

Planning for Retirement as an Independent Adjuster - Adjusting to 6 Figures - 0 views

  •  
    An estimated 13% of the American workforce consists of independent contractors, including many independent adjusters. Being self-employed, and/or working under the protection of a business entity such as a Limited Liability Company (LLC), means that you aren't privy to benefits that W2 employees may have. Retirement planning - including employer contributions and the ability to defer your own pay, tax-free - is one of those major benefits. You'll be happy to know, however, that there are retirement planning opportunities for the self-employed (including independent adjusters) that offer similar - if not superior - opportunities.
adjustingto6figu

Insurance Adjusters and Back-Door Company Deals - 0 views

  •  
    One of the main qualities that insurance adjusters or an independent claims adjuster needs to have is to be trustworthy. Ethics play a major role in any business, and especially when it comes to insurance claims. Fraud in this industry can sometimes be written off as a "victimless" crime which is not necessarily true, as other insureds are footing the bill for the insurance companies' losses. If an adjuster is committing fraud or trying to scam the system and earn extra money, he is hurting everyone who uses that insurance company
buyglobalshop

Buy Verified Wise Accounts - 100% Best Quality & full document verified - 0 views

  •  
    Overseeing your accounts can be overpowering at times, but having a Astute Account can offer assistance disentangle the prepare. But what precisely are Shrewd Accounts? In brief, they are online accounts that offer a extend of money related items and administrations to offer assistance you way better oversee your cash. From investment funds accounts to charge cards, Astute Accounts give a one-stop shop for all your budgetary needs. With easy-to-use online stages and portable apps, keeping track of your funds has never been easier. Buy Verified Wise Accounts How do Astute Accounts work? Have you ever listened of Astute Accounts and pondered how they work? Shrewd Accounts are getting to be progressively prevalent as a secure and proficient way to oversee your funds. In a nutshell, Astute Accounts are virtual accounts that can be set up online and grant you the adaptability to send, get, and oversee cash in different monetary forms without the require for a conventional bank account. Buy Verified Wise Accounts Wise Accounts work by utilizing a peer-to-peer organize to encourage exchanges, cutting out the agent and lessening expenses related with conventional keeping money. This implies that you can effortlessly exchange cash over borders and monetary standards at the genuine trade rate, without the covered up expenses that banks frequently charge. Furthermore, Astute Accounts offer straightforward estimating and easy-to-use online stages, making it a helpful alternative for people and businesses looking to streamline their money related transactions. Buy Verified Wise Accounts What are the benefits of having a Shrewd Account? Wise Accounts, too known as shrewdly reserve funds accounts, offer various benefits to account holders. These inventive accounts give a extend of highlights that can offer assistance you oversee your funds more successfully and reach your investment funds objectives faster. Buy Verified Wise Accounts One key advantage of having a Shrewd Accoun
Dimny Lopzzy

12 Month Installment Cash Loans Valid Solution For Cash Needs! - 0 views

Getting urgent cash backing is a major challenge, but with online 12 Month Installment Cash Loans the task is made much easiest option to get funding within a same day. With faster loan countersign...

online long term loans 12 month payday loans 12 month cash loans installment cash loans' long term payday loans cash 12 month installment

started by Dimny Lopzzy on 21 Oct 16 no follow-up yet
Dimny Lopzzy

12 Month Installment Cash Loans Valid Solution For Cash Needs! - 0 views

Getting urgent cash backing is a major challenge, but with online 12 Month Installment Cash Loans the task is made much easiest option to get funding within a same day. With faster loan countersign...

online long term loans 12 month payday loans 12 month cash loans installment cash loans' long term payday loans cash 12 month installment

started by Dimny Lopzzy on 09 Jan 17 no follow-up yet
Anne Bubnic

The Kids are Alright [Study of Privacy Habits] - 4 views

  •  
    An October 2010 study of the privacy habits of parents and their teens on social networks, conducted by TRUSTe, one of the foremost authorities on online privacy. Data suggests that the majority of teens use privacy controls on social networks and that most parents actively monitor their teen's privacy. However, there is still room for improvement a some privacy areas were identified where teens are at risk on social networks. There are some good videos on this site including parents and teens talking about privacy issues.
Anne Bubnic

Rupert Murdoch: Big Man On Campus - 0 views

  •  
    Heading back to college this fall? Rupert Murdoch will be waiting. In May, his Fox News subsidiary bought a minority stake in a Web video-based college news network featuring student reporters called Palestra.net. This fall, he'll be ramping up the partnership. It's the latest--and boldest--move by a major media company to capitalize on America's some 6.1 million undergrads.
Anne Bubnic

Humiliation and gossip are weapons of the cyberbully - 0 views

  • ead teachers are being advised to draw up new rules on mobile phone use amid a growing number of cases of what is now known as “cyber-bullying”. In many secondary schools, over 90% of bullying cases are through text messages or internet chatrooms. It is hoped that the rules about mobile phone use will protect children from abusive texts, stop phones going off in class and prevent mobiles being taken into exam halls.
  • Although the majority of kids who are harassed online aren’t physically bothered in person, the cyber-bully still takes a heavy emotional toll on his or her victims. Kids who are targeted online are more likely to get a detention or be suspended, skip school and experience emotional distress, the medical journal reports. Teenagers who receive rude or nasty comments via text messages are six times more likely to say they feel unsafe at school.
  • The problem is that bullying is still perceived by many educators and parents as a problem that involves physical contact. Most enforcement efforts focus on bullying in school classrooms, corridors and toilets. But given that 80% of adolescents use mobile phones or computers, “social interactions have increasingly moved from personal contact at school to virtual contact in the chatroom,'’ write Kirk R. Williams and Nancy G. Guerra, co-authors of one of the journal reports. “Internet bullying has emerged as a new and growing form of social cruelty.'’
  • ...1 more annotation...
  • Cyber-bullying tactics include humiliation, destructive messages, gossip, slander and other “virtual taunts” communicated through e-mail, instant messaging, chatrooms and blogs. The problem, of course, is what to do about it. While most schools do not allow pupils to use their mobiles in the school building, an outright ban is deemed unworkable. Advances in technology are throwing up new problems for teachers to deal with. Children use their phones to listen to music, tell the time or as a calculator. Cyber-bullies sometimes disclose victims' personal data on websites or forums, or may even attempt to assume the identity of their victim for the purpose of publishing material in their name that defames them or exposes them to ridicule.
  •  
    As more and more people have access to computers and mobile phones, a new risk to youngsters has begun to emerge. Electronic aggression, in the form of threatening text messages and the spread of online rumours on social networking sites, is a growing concern.
Anne Bubnic

HSTE Project » Digital Citizenship - 0 views

  •  
    Digital Citizenship Course: The purpose of this Wikispace is to explore the "Right Way" and "Wrong Way" to use the internet, blogs, wikis, email and Social Networking websites. Many students use the internet to communicate with their friends. Popular sites such as Facebook or Myspace are used by many students on a daily basis. The majority of students also have cell phones and text message or instant message (IM) their friends. So the question is this: Do you know how properly use technology and Social Networking tools safely and effectively?\n
Anne Bubnic

Our Kids Are Failing - And It's All Wikipedia's Fault! - 0 views

  • n. Yesterday, news broke out in Scotland about how the internet was to blame for Scotland's failing exam pass rates. According to the Scottish Parent Teacher Council (SPTC), Wikipedia, among other sources, was cited as the reason as to why the students were failing. Is this a case of the internet making us stupid? Or do students just need to learn how to use the new research tools of the web a little more appropriately?
  • Children are very IT-savvy, but they are rubbish at researching." She noted that today's students do the majority of their research online instead of using books or other resources that could be found at the library.
  •  
    Children may be net savvy but their critical reading and research skills are not finely honed. They don't understand that they shouldn't believe everything they read. To kids, WIKIPEDIA is still the gospel.
anonymous

Online Predators and Their Victims - 0 views

  • My (Liz B. Davis ) Summary of Key Points (All are quotes directly from the article): Online "Predators" and Their Victims. Myths, Realities, and Implications for Prevention and Treatment. by: Janis Wolak, David Finkelhor, and Kimberly J. Mitchell - University of New Hampshire and Michele L. Ybarra - Internet Solutions for Kids, Inc.
  • The publicity about online"predators" who prey on naive children using trickery and violence is largely inaccurate.
  • adult offenders who meet, develop relationships with, and openly seduce underage teenagers
  • ...21 more annotations...
  • In the great majority of cases, victims are aware they are conversing online with adults. In the N-JOV Study, only 5% of offenders pretended to be teens when they met potential victims online. (112)
  • Offenders rarely deceive victims about their sexual interests.
  • promises of love and romance
  • 99% of victims of Internet-initiated sex crimes in the N-JOV Study were 13 to 17 years old, and none were younger than 12. 48% were 13 or 14 years old. (115)
  • ..Although Internet safety advocates worry that posting personal information exposes youths to online molesters, we have not found empirical evidence that supports this concern. It is interactive behaviors, such as conversing online with unknown people about sex, that more clearly create risk. (117)
  • take place in isolation and secrecy, outside of oversight by peers, family  members, and others in the youth's face-to-face social networks (115)
  • Most of the online child molesters described in the N-JOV Study met their victims in chatrooms. In a 2006 study, about one third of youths who received online sexual solicitation had received them in chatrooms. (116)
  • Youth internet users with histories of offline sexual or physical abuse appear to be considerably more likely to receive online aggressive sexual solicitations. (117)
  • it was those 15-17 years of age who were most prone to take risks involving privacy and contact with unknown people. (115)
  • We recommend educating youths frankly about the dynamics of Internet-initiated and other nonforcible sex crimes. Youths need candid, direct discussions about seduction and how some adults deliberately evoke and then exploit the compelling feelings that sexual arousal can induce. (122)
  • maintaining online blogs or journals, which are similar to social networking sites in that they often include considerable amounts of personal information and pictures, is not related to receiving aggressive sexual solicitation unless youths also interact online with unknown people. (117)
  • Boys constitute 25% of victims in Internet-initiated sex crimes, and virtually all of their offenders are male. (118
  • Some gay boys turn to the internet to find answers to questions about sexuality or meet potential romantic partners, and there they may encounter adults who exploit them. (118)
  • ..child molesters are, in reality, a diverse group that cannot be accurately characterized with one-dimensional labels. (118)
  • Online child molesters are generally not pedophiles. (118)Online child molesters are rarely violent. (119)
  • Child pornography production is also an aspect of Internet-initiated sex crimes. One in five online child molesters in the N-JOV Study took sexually suggestive or explicit photographs of victims or convinced victims to take such photographs of themselves or friends. (120)
  • Youths may be more willing to talk extensively and about more intimate matters with adults online than in face-to-face environments. (121
  • it may not be clear to many adolescents and adults that relationships between adults and underage adolescents are criminal. (122)
  • Simply urging parents and guardians to control, watch, or educate their children may not be effective in many situations. The adolescents who tend to be the victims of Internet-initiated sex crimes many not themselves be very receptive to the advice and supervision of parents. (122)
  • Online molesters do not appear to be stalking unsuspecting victims but rather continuing to seek youths who are susceptible to seduction. (117)
    • anonymous
       
      Let's remember that although there are direct references to gay and male pedophiles of gay boys, that 99% of child sex offenders identify as heterosexual, online or offline.
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
  •  
    This research article has the facts about sexual predatory behavior.
Rhondda Powling

Cyberbullying - digizen.org - 2 views

  •  
    On this area of the Digizen website we outline the three major areas of the advice, Understanding, Preventing and Responding; and provided links to current resources.
Anne Bubnic

Bullying: Declining or Just Moving Online? - 1 views

  • Also, bullying and harassment via interactive technology, such as social-networking sites, text-messaging and other media, is still a major problem that may not be fully reflected in the study; some students may simply be taking their aggressions online
  •  
    The reported behavior improvements aren't universal, however. The study shows the biggest improvements in behavior took place among children in low-income households; experts speculate that the declines in bullying are probably confined to schools that have mounted coordinated programs to halt it.
Anne Bubnic

The Case of the Plagiarized Paper [Video Caper] - 1 views

  •  
    Suggested classroom use (4th-10th grade): writing, literature, history, technology/computer teachers, character education, leadership classes. Additional use: school-wide assemblies, school broadcasts, district streaming, counselor sessions, "back to school" programs on cheating/plagiarism, college prep, in preperation for assigning a major writing assignment,
Anne Bubnic

A Pocket Guide to Social Media and Kids | [Nov09] - 2 views

  • Mobile devices represent a major impetus behind the social media movement, driving part of the 250% audience increase for the year ending February 2009. Teens represented 19% of the 12.3 million active social networkers.
  • To adults, cell phones are a communications device. To children, they are a lifeline. Consider that the average 13-17 year old sends more than 2,000 text messages per month. Compared with the total mobile Internet population, teens are much bigger consumers of social media, music, games, videos/movies and technology/science.
  •  
    When is a phone not a phone? In the hands of children and tweens, today's cell phones are primarily used as text messaging devices, cameras, gaming consoles, video viewers, MP3 players, and incidentally, as mobile phones via the speaker capability so their friends can chime in on the call. Parents are getting dialed in to the social media phenomenon and beginning to understand-and limit-how children use new media
‹ Previous 21 - 40 of 49 Next ›
Showing 20 items per page