Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged monitoring

Rss Feed Group items tagged

Anne Bubnic

New York State: Scrambling for solutions to cyberbullying - 0 views

  • Both the state Senate and Assembly have proposed anti-cyberbullying laws. Kathy Wilson of Sen. Carl Marcellino's (R-Syosset) office said that the Senate has proposed two bills in the last two years that add computers to the list of modes of illegal harassment, but the Assembly passed neither.The Assembly's website states that the Assembly has proposed bills "to define and prohibit the bullying, cyberbullying and hazing of students and others on school property" as well as to add a database for reporting such complaints, but has not passed either yet.
  • Both the state Senate and Assembly have proposed anti-cyberbullying laws. Kathy Wilson of Sen. Carl Marcellino's (R-Syosset) office said that the Senate has proposed two bills in the last two years that add computers to the list of modes of illegal harassment, but the Assembly passed neither.
  • The Assembly's website states that the Assembly has proposed bills "to define and prohibit the bullying, cyberbullying and hazing of students and others on school property" as well as to add a database for reporting such complaints, but has not passed either yet.
  • ...1 more annotation...
  • Matuk said that the task of monitoring children's electronic activities has been complicated by such devices as iPhones, from which I.M.s can be sent from anywhere. "This is going to require partnership between the schools and the community," he added.
  •  
    Schoolyard bullies are a long-standing problem but now, in the age of the Internet, they are increasingly using electronic devices to torment their victims. Because cyberbullying has become so prevalent, several states, including New York, have proposed legislation to control cyberbullying.
Anne Bubnic

The Road to Cybersafety - 0 views

  • Carrill is part of the Platte County Sheriff’s Office. He also leads the Western Missouri Cyber Crimes Task Force. One of his primary missions is to track down and arrest online predators who trade in child pornography.And all these cameras only make his job more challenging. About 40 percent of the nation’s minors have access to Webcams, Carrill explained, devices for uploading live video to the Internet. About 65 percent of all children have access to cell phone cameras.
  • erhaps the biggest issue is that fact that kids don’t understand that when a picture is posted online, it’s nearly impossible to remove.“Once that image is taken, it’s out there forever,” Shehan said. “The No. 1 issue that we’ve seen with Webcams is teenagers self-producing pornography.”
  • All we can tell them is, ‘I’m sorry,’” Carrill said. “The minute the camera clicks, you no longer own that image. It has the potential to harm that person years from now.”A Webcam placed in a child’s bedroom is another bad combination, according to Shehan and Carrill. Sexual predators search for kids who use Webcams in the privacy of their own rooms, then lure or blackmail the child into providing pictures of themselves.“We see cases time after time of children who take pictures, send them to a predator and get a pornographic collage back that the predator uses to blackmail the child into providing more images,” Shehan said.
  • ...3 more annotations...
  • . About 40 percent of the nation’s minors have access to Webcams, Carrill explained, devices for uploading live video to the Internet. About 65 percent of all children have access to cell phone cameras.Carrill’s team recently started a new operation to search image-trading Web sites for known child pornography in Missouri. The results were frightening, he said. More than 6,000 images were found in the state; about 700 of those pictures were downloaded in the Kansas City area.Between sexual predators who fish for images and immature decisions by kids with cameras, more children are either having their images posted online or being exposed to pornography, according to a 2006 report by the National Center for Missing and Exploited Children.
  • In the end, the best tool to defeat child pornography is parent education, according to both Shehan and Carrill. More than anything, kids need to know they can trust their parents.“It’s through that open line of communication between the parent and child that they can work through or prevent bad situations,” Carrill said.
  • All parents should follow a few basic rules when it comes to cyber safety, according to experts:- Keep computers in common areas of the home.- Monitor Internet use by children.- Enable privacy protection software.- Turn Webcams off or protect them with a password.- Track what images are being uploaded by children in the household.- Talk to children about what is appropriate.
  •  
    Webcams, cell phone cameras being put to troubling use, experts say. People are taking pictures, lots of them, and then uploading them as permanent displays in the Internet collection.
Anne Bubnic

Cyberbullying The Real Threat on the Digital Playground - 0 views

  • "Parents are the key to this whole issue," explains Leasure. "They need to be involved and monitoring the computer and Internet activity of their kids. If they see something that isn't right, they need to act as parents and correct the issue."
  • parental awareness is truly the key to fixing this problem. If your child is the victim - or worse, the bully - it's time to step in. it's not being over-protective; it's trying to stop the current generation from 'virtually' destroying themselves emotionally
  • Cyberbullying Statistics: A recent survey of 395 students, ages 11 to 19, was conducted by the Kids/Teen Division of the Maine-based online safety organization Working To Halt Online Abuse. The study found that: � 28% of students have been cyberbullied, but... � Just over half tell their parents or another adult about it; of the students who did not report the cyberbullying, 25% felt it wasn't a big problem or didn't want to make a big deal out of it � 65% reported the cyberbullying was via IM, followed by email, MySpace, chat rooms and online games � 43% were cyberbullied by someone their age or in the same grade � 30% blocked or deleted the cyberbully, while 16% ignored them � 54 students admitted they had bullied somebody online themselves
  •  
    While reports and stories in the media focusing on Internet predators have become all too frequent, the closer-to-home threat to our children may really be cyberbullying, also known as electronic or online bullying. A recent survey of 395 students (11 to 19 years old) found that 28% of students have been cyberbullied, and more than 1 in 7 admitted to acting as the bully."Cyberbullying could be the biggest online threat facing teens today," says James Leasure, co-founder of Pandora Corp. "Of course Internet predators do still exist, but statistically, kids have a much greater chance of being involved in some way with electronic bullying." Most cases of cyberbullying go undocumented because, fortunately, many kids are able to shrug off the 'unkind words' and look the other way. But there are some cases that make national headlines when they turn into tragedies, such as the Megan Meier case in 2006. Larger cases like this have prompted several states to adopt legislation that makes online bullying illegal.
Judy Echeandia

Help for Victims of Identity Theft - 0 views

  •  
    The Office for Victims of Crime (OVC) website offers identity theft and identity fraud information, services, and recovery aids, and includes links to Government Resources, National Organizations and Credit-Monitoring Organizations.
Anne Bubnic

Parents are in the Dark: What Kids Really Do Online - 1 views

  •  
    U.S. moms and dads estimate that their children spend only two hours a month on the internet, but kids say they actually spend 10 times more time - or 20 hours - according to a recent study, the first Norton Online Living Report by Symantec (via MarketingCharts). 41% of respondents age 13-17 say their parents have no idea what they do online, and only 33% of parents worldwide say they set parental controls and monitor their children's online activities.
Raymond Lai

Pandora 6.0 Computer Monitoring Software Will Help Parents Teach And Enforce Cybersafet... - 1 views

  •  
    Discussion between parents and children is the best way to create trust. But computer use especially by new users can not be expected to be "private" from their parents. Filtering has its place, but should be used to generate trust and not access blame or perjorative measures. Students will always find a way to circumvent filtering and internet restriction. What are you're opinions? Has anyone used PC Pandora 6? Ray http://www.google.com/profiles/Raymond.WM.Lai#buzz
Anne Bubnic

Managing Comments and Posts On Student Blogs - 2 views

  •  
    Tips For Better Blogging, Using Blogs With Students, Working With Web 2.0 Tools - Sue Waters (April 09). Sue describes a process for monitoring student blogs using Google Reader.
Anne Bubnic

Parental Control Product Guide 2010 [pdf] - 1 views

  •  
    Parental controls provide one or more of five main functions: content filtering; use restrictions; contact management; privacy protections; and monitoring. This guide provides helpful info for parents on controls for Internet, Mobile Phones, Gaming Consoles and Media Players.
JOSEPH SAVIRIMUTHU

Is Twitter the next Second Life? - 0 views

  • Lance Armstrong loves it. Oprah’s all over it. Ashton Kutcher found a million people to follow him on it. Heck, Barack Obama used it to get elected president. So why is Twitter in trouble? According to David Martin, Vice President of Primary Research at Internet traffic monitor Nielsen Online, the site suffers from a retention problem. From month to month, Nielsen data says, just 40 percent of Twitter’s users return to it.
  •  
    Twitter, the microblogging service has been the tech darling of late - racking up new users at a dizzying pace. But there simply aren't enough new users to make up for defecting ones claims one blogger. FaceBook and MySpace, the two social networking giants had double the retention rates Twitter has now. And, as fans are quick to point out in fields of comments around the Web, Facebook offers so many more ways to interact than Twitter.
Anne Bubnic

Digital Citizenship: Monitoring Technology Use & Abuse [pdf] - 0 views

  •  
    THE JOURNAL (arcticle) by Mike Ribble and Gerald Bailey. Provides a five-step program for creating a digital citizenship program in your school.Over the last two years, it has become evident that a behavior pattern of misuse and abuse with respect to technology is \nbeginning to emerge in our society. This outbreak of \ntechnology misuse and abuse is documented in continual news \ncoverage on TV, in newspapers and on the Internet - both \ninside and outside of schools. The endless list of misuse and \nabuse includes hacking into school servers, using e-mail to \nintimidate or threaten students, illegally downloading music, \nplagiarizing information from the Internet, using cellular \nphones during class time, accessing pornographic Web sites, \nand playing video games during class. Therefore, if you are \nusing technology in your district, you must begin to deal with \ndigital citizenship in a significant way. \n
Anne Bubnic

Technology Doesn't Cause Bullying And -- Despite Claims -- It Can't Prevent It - 5 views

  •  
    Bullying isn't caused by technology and it's not cured by it either. It's about relationships.
acrel2023

motor surge protection - 1 views

  •  
    The motor control and protection system can not only support the independent DCS process control network, but also realize the independent motor intelligent monitoring; it can also effectively protect the motor, eliminate hidden dangers, ensure the safe production of the factory, improve the process precision of the automatic process control and prolong the service life of the equipment.
acrel2023

iot based smart metering system - 1 views

  •  
    The traditional business model has the following drawbacks: high data system prices, required diversified data service, difficult debugging, system hardware selection problems and inconvenient service payment.
acrel2023

smart meter for ev charging - 1 views

  •  
    Acrel charging pile solution covers the front desk (mobile phone/tablet APP, charging pile man-machine interface) and background management system. Users can use the mobile phone/tablet APP to find and navigate charging piles, reserve charging, monitor charging status, or use the charging pile man-machine interface to charge.
buyverifiedets

Buy Verified Facebook Business Manager - 100% Safe & Verified BM ... - 0 views

  •  
    Introduction You probably already know what Facebook is if you're reading this, and you might even have a personal profile there. A Facebook business manager is what, though? This solution enables companies to develop and control their Facebook presence from a single location. What Is a Facebook Business Manager? Any company that wants to use Facebook needs a Facebook business manager. It's a platform that enables companies to set up and control their Facebook presence in a single location. It's a tool that enables companies to make and manage Facebook advertisements, pages, and apps all in one location. Additionally, it's a tool that enables companies to monitor their outcomes and assess their success. Buy Verified Facebook Business Manager
acrel2023

wireless thermocouple transmitter receiver - 0 views

  •  
    With a power source of DC24V and consumption of ≤1W, this transceiver can handle up to 60 points and has a resolution of 0.1°C. Communication is via RS485 with a MODBUS-RTU protocol, and it supports baud rates of 2400, 4800, 9600, and 19200 bps. Perfect for monitoring in environments with temperatures ranging from -20°C to +55°C and humidity of ≤95%. Trust Acrel for all your wireless thermocouple transmitter receiver needs.
rhcmed

oxygen machine at hospital - 0 views

  •  
    Medical devices offer a myriad of benefits, enhancing patient care by providing accurate diagnoses, improving the quality of life, and extending life expectancy. The medical device wholesale enables less invasive surgical procedures, reducing recovery times and hospital stays. These oxygen generator for hospital also support continuous monitoring and management of chronic conditions, facilitating timely interventions and personalized treatment plans.
rhcmed

sonogram machine for dogs - 0 views

  •  
    Veterinary Medical Devices from RHC Medical are specialized equipment designed for animal healthcare. From digital thermometers to ultrasound machines, these animal medical devices assist veterinarians in diagnosing, monitoring, and treating animals, ensuring their well-being and providing comprehensive veterinary care.
rhcmed

medical device company - 0 views

  •  
    Medical devices offer a myriad of benefits, enhancing patient care by providing accurate diagnoses, improving the quality of life, and extending life expectancy. The medical device wholesale enables less invasive surgical procedures, reducing recovery times and hospital stays. These medical machines also support continuous monitoring and management of chronic conditions, facilitating timely interventions and personalized treatment plans.
« First ‹ Previous 41 - 59 of 59
Showing 20 items per page