Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged natural

Rss Feed Group items tagged

adjustingto6figu

The Top 5 States Afflicted by Natural Disasters - Adjusting to 6 Figures - 0 views

  •  
    "Many areas in the United States are affected by natural disasters at various times of the year. However, there are a few states where natural disasters seem to occur more often. These areas have higher insurance premiums as a result of more claims and increased risk for loss. Considering the number of disasters that occur, there is a higher need for adjusters in the following areas."
adjustingto6figu

The Top 5 States Afflicted by Natural Disasters - 0 views

"Many areas in the United States are affected by natural disasters at various times of the year. However, there are a few states where natural disasters seem to occur more often. These areas have h...

claims adjusters property adjuster insurance catastrophe cat independent life field staff natural disaster management

started by adjustingto6figu on 21 Jul 17 no follow-up yet
Devia Rajput

On the Earth Top 10 Perilous Lice - 0 views

  •  
    Hi Friends Today I'll Show you top ten dangerous parasites on the earth.In the following article you will study on Top 10 most Dangerous and Deadly Parasites in the world which does horrible things to person and other nature. Among so many mean things that our natural history has offer our earth, some of them are referred to as vermin.
famousmushtaqali

Love spells mantra - 0 views

  •  
    Love spell in India - Get effective love spell to regain you're love partner in the natural from in love spell in India segment of Miya Mushtaq ji.
Anne Bubnic

Social Networking Gets Schooled - 0 views

  • As a whole, the education industry is usually relatively slow to integrate technology into the classroom. In lots of schools nationwide, unbridled access to computers and the Internet is still the exception rather than the rule.
  • The moment students get outside of the classroom, on the other hand, social networking is almost a daily ritual.
  • Dedicated commercial Web 2.0 products and social networking applications are still too new and too rich for typical school leaders to afford. So third-party providers are more likely to offer technology services to students and their schools to expand their horizons in ways never before possible. For example, some school districts are going beyond e-mail technology and using collaboration software and online services to share information, host Web conferences and assign tasks and projects.
  • ...1 more annotation...
  • "Teachers are famous for relying on other teachers for the best ideas about what's working and what's not working. For that reason, as new teachers (read younger, tech-savvy, "Generation Network" college grads) enter the system, they are leveraging education-focused social networks to connect with other teachers, find content contributed by teachers and make sure that they are wringing every ounce of 'network effect' technology from the Internet."
  •  
    To today's students, online social networking is almost second nature outside of the classroom. What about inside the classroom? Educational software and services are taking a cue from Facebook and MySpace, adding a twist of online collaboration and interaction that brings students, teachers and parents together.
Anne Bubnic

The Anthropology of Digital Natives Webcast (Library of Congress) - 0 views

  •  
    Young people today born into a digital world are experiencing a far different environment of information-gathering and access to knowledge than a generation ago. Who are these "digital natives" and what are they thinking? How are they using the technology, and are IT experts adequately responding to them? These questions will be addressed in a new Library of Congress series titled "Digital Natives." The four-lecture series will examine the generation that has been raised with the computer as a natural part of their lives, with emphasis on the young people currently in schools and colleges today. The series will seek to understand the practices and culture of these digital natives, the cultural implications of the phenomenon and the implications for education -- schools, universities and libraries.
Kate Olson

Online Civic Engagement Tools for Youth - 1 views

  •  
    The popularity of Facebook, MySpace, IM, and email with youth in developed countries demonstrates how second nature the online world has become for youth.
Anne Bubnic

FBI-SOS: Safe Online Surfing - 0 views

  •  
    The FBI-SOS Internet Challenge is an internet safety program designed to help students recognize potential dangers associated with the internet, email, chat rooms and social networking sites. The program addresses and defines topics serious in nature such as seduction, child pornography, solicitation, exploitation, obscenity and online predators. Students take web-based quizzes and review specific web sites aimed at promoting online safety.
Anne Bubnic

How Twitter can make history [Video] - 0 views

  •  
    While news from Iran streams to the world, Clay Shirky shows how Facebook, Twitter and TXTs help citizens in repressive regimes to report on real news, bypassing censors (however briefly). The end of top-down control of news is changing the nature of politics.
Devia Rajput

on Earth Top 10 Perilous Germs - 0 views

  •  
    Hi Guys here you see the most dangerous and perilous Bacteria or germs on the earth.Nature has formed some of the tiniest microscopic giant that has the capability to just throw us away. These small Bacteria are universally about us, be it soil, water or air. Some of the bacteria are no hesitation helpful for us while several are extremely dangerous and can show fatal.
Devia Rajput

On Our Earth Top 10 Biggest Birds - 0 views

  •  
    Hi Friends Today i'll explain you about the most biggest and largest birds on our beautiful earth.these birds increase the nature beauty.Now we have read in this article that which bird is largest or which bird is highest in the world. Then you are at the exactly place. Birds are very lovable, and it comes in different shape and sizes. It can be as small as 5 cm (bee hummingbird), and as big as 2.1 meter (Ostrich). Flying ability gives the bird's ability to migrate to all around the world.
solospiders

Front Door Wreath - 0 views

  •  
    This Front Door Wreath is very cute & well made! I have searched for a wreath like this in various stores, but this one is by far more affordable. The leaves are full & bright. It seems to durable & holds up in windy weather. The Babys Breath wreath with plastic green and pink Babys Breath leaves and sturdy plastic ring backing,UV resistant Wreath, Green Colors,realistic and natural.We use plentiful artificial Gypsophila branches with mini green leaves for the extra full look! This wreath would look beautiful against your front door or even displayed on a covered patio. It really adds a nice color & look to my front door
Dean Mantz

academyofdiscovery - Internet Safety - 8 views

  • I will never post any information more personal than my first name nor will I post pictures of myself. I will not plagiarize, instead I will expand on others' ideas and give credit where it is due. I will use language appropriate for school. I will not insult my fellow students or their writing. I will only post pieces that I am comfortable with everyone seeing; other pieces I will keep as drafts. I will not be afraid to express my ideas, while not overgeneralizing or making derogatory/inflammatory remarks; any posts or edits on controversial issues must either be submitted to Mr. Wilkoff prior to posting or be a part of a classroom project/question which addresses controversial issues. I will use constructive/productive/purposeful criticism, supporting any idea, comment, or critique I have with evidence. I will take all online content creation seriously, posting only things that are meaningful and taking my time when I write. I will try to spell everything correctly. I will not use my public writing (blog posts, comments, discussion topics, wiki edits) as a chat room, instead, I will save IM language for private conversations. I will not bully others in my blog posts or in my comments. I will never access another student's account in order to pose as them or look at their personal content, but I will advise them when they haven't logged out of their computer from my own account. I will be proactive in monitoring the comments that others leave on my blog, utilizing the comment blacklist if necessary. I will personalize my blog and keep my writing authentic, while taking responsibility for anything blogged in my name. I will not provoke other students in my blog posts or comments. I will use my online content as an extension of the classroom, and in doing so, I will leave anything that unsaid in the classroom unsaid online. I will only post photos which are school appropriate and either in the creative commons or correctly cited. I will not spam (including, but not limited to meaningless messages, mass messages, and repetitive messages) I will only post comments on posts that I have fully read, rather than just skimmed. I will respect the public nature of online information, and in doing so, I will respect the wishes of my fellow students for keeping their information (full name, compromising stories, etc.) private.
Anne Bubnic

Cyber Bullying Presents a Complex Legal Landscape - 0 views

  • Cyber bullying conducted at school allows school authorities to more easily impose discipline. The use of school equipment to cyber bully also makes a stronger legal argument for action by the school. And if the student e-mails offensive speech to school or downloads it at school and then distributes it, the school is in an advantageous position regarding disciplining the student. However, speech created at home—such as the creation of a Web site—affords greater legal protection for cyber bullies.
  • “The problem with the approach that web speech created at home can—if accessed at school—become school speech that can be regulated is the very nature of the Internet. Once something is created and placed on the Internet, the author loses control over who can access the speech and where it can be accessed.”
  •  
    As students across the country return to school, school districts face an often complicated and confusing legal landscape on how to deal with cyber bullies in their schools, according to Todd DeMitchell, EdD, a professor of education, who studies school liability, adequate supervision, and responses to preventing bullying and cyber bullying from school administrators and state legislatures.
Anne Bubnic

Why the Google generation isn't as smart as it thinks. - 0 views

  • Distracted: The Erosion of Attention and the Coming Dark Age
  • Attention is the golden key to the mystery of human consciousness; it might one day tell us how we make the world in our heads. Attention comes naturally to us; attending to what matters is how we survive and define ourselves.
  • Multitaskers fool themselves by rapidly switching attention and, as a result, their output deteriorates.
  • ...1 more annotation...
  • Meyer says there is evidence that people in chronically distracted jobs are, in early middle age, appearing with the same symptoms of burn-out as air traffic controllers. They might have stress-related diseases, even irreversible brain damage. But the damage is not caused by overwork, it’s caused by multiple distracted work. One American study found that interruptions take up 2.1 hours of the average knowledge worker’s day
  •  
    The digital age is destroying us by ruining our ability to concentrate.
Vicki Davis

Search and Seizure of Cell Phones: Can You Hear Me Now? - 0 views

  • May school officials lawfully “search” the confiscated cell phone to look at stored text messages, photographs, videos, and logs of incoming and outgoing calls? Clearly, the circumstances of the search must satisfy the T.L.O. standard. Not as clear, however, is whether such a search violates federal or Michigan laws regarding stored electronic communications.
  • [A] search of a student by a teacher or other school officials will be ‘justified at its inception’ when there are reasonable grounds for suspecting that the search will turn up evidence that the student has violated or is violating either the law or the rules of the school. Such a search will be permissible in its scope when the measures adopted are reasonably related to the objectives of the search and not excessively intrusive in light of the age and sex of the student and the nature of the infraction.”
  • In Klump v Nazareth Area Sch Dist, 425 F Supp 2d 622 (ED Pa, 2006), a federal district court denied the school’s motion to dismiss a lawsuit filed by a student whose cell phone was searched.
  • ...5 more annotations...
  • compensatory and punitive damages for the alleged unconstitutional search, violation of the Pennsylvania Wiretapping and Electronic Surveillance Control Act, invasion of privacy, and defamation.
  • The court ruled that the student had stated a claim for the alleged violation of his right to be free from an unreasonable search.
  • here was no basis for them to search the text and voice mail messages stored on the phone.
  • unlawful access to the stored voice mail and text message communications.
  • (2) A person shall not willfully and maliciously read or copy any message from any telegraph, telephone line, wire, cable, computer network, computer program, or computer system, or telephone or other electronic medium of communication that the person accessed without authorization. (3) A person shall not willfully and maliciously make unauthorized use of any electronic medium of communication, including the internet or a computer, computer program, computer system, or computer network, or telephone.
  •  
    Legal Implications for Searching Student Cell Phones. Although this article is written against Michigan law, it does help clarify some of the concepts for what is permissable. Note that searching a student's cell phone or wireless device without parent permission may violate state wiretapping laws.
  •  
    Confiscating and looking at information on cell phones by school officials is still not clear. This is a very interesting case study for those working with digital citizenship issues at their school.
  •  
    Fascinating article explaining Michigan take on searching and confiscating cell phones.
Anne Bubnic

Case of the Plagiarized Paper [Video teaser] - 0 views

  •  
    Dave, a fellow 8th grade classmate needs help from the Club. Someone in Mr. B's class plagiarized their own paper-and since Mr. B has a bell curve it affects everyone. Dave's grade is lowered and his parents are sending him to Boarding School! Adina's Deck takes the case in order to help Dave get the grade he deserves. In this who-done-it, there are four main suspects, and the club needs to investigate each of their alibis to catch the cheater and save Dave. After a difficult case, the club learns about the true nature of plagiarism- and that doing things right the first time just might be a trustworthy solution.
Anne Bubnic

Please Stop The 'Sexting' Insanity - 0 views

  • They define sexting as - "sending, receiving and/or posting sexy messages/photos (e.g. photos of themselves in their underwear, or without clothes, messages of a sexual or suggestive nature) online and via cell phone/email."
  • he survey was self-selecting, i.e. girls volunteered to take it after seeing it promoted on the homepage. This always biases the results.
  • But I also know how freaked out parents are about all of these issues — and unfortunately, the way this survey is being spun, along with a lot of the media coverage, only perpetuates a culture of fear around these issues.
  •  
    Flames of Moral Panic: You may have noticed that the media has fully embraced "sexting" [a term invented by the media] as the latest horror story about teens and technology. First it was about how the internet is teeming with predators a la "To Catch A Predator," with the most dramatic stories focusing on girls who met these predators in real life [read the real deal here: Online "Predators" And Their Victims]. Next it was about cyberbullying, highlighting the most extreme cases that ended in young people having to switch schools or even more tragically committing suicide. The latest is "sexting," where teens are naively sending and receiving sexually explicit photos or video of themselves to friends via cell phone, again, with the most dramatic cases highlighted.
JOSEPH SAVIRIMUTHU

IWF reports global decrease in child sexual abuse websites - 0 views

  • The Internet Watch Foundation (IWF) today published its Annual Report 2008 revealing a fall of nearly 10% in the number of international websites with child sexual abuse content. The report warns against complacency, pointing to the serious nature of the images which are often carried on commercial websites.   The report also highlights the fact that 74% of child sexual abuse domains traced by IWF are commercial operations selling indecent images of children, and 75% of the these (some 850 unique domains) are registered with just 10 domain name registries. This underlines the importance of recent international efforts with domain name registries to get the site names delisted, and will remain a focus of IWF attention going forward.
Anne Bubnic

Teaching Copyright.org - 0 views

  • This misinformation is harmful, because it discourages kids and teens from following their natural inclination to be innovative and inquisitive. The innovators, artists and voters of tomorrow need to know that copyright law restricts many activities but also permits many others. And they need to know the positive steps they can take to protect themselves in the digital sphere. In short, youth don't need more intimidation — what they need is solid, accurate information
  • There's a lot of misinformation out there about legal rights and responsibilities in the digital era.
  •  
    EFF (Electronic Frontier Foundation) created Teaching Copyright as a balanced curriculum encouraging students to make full and fair use of technology that is revolutionizing learning and the exchange of information. The Teaching Copyright curriculum was developed with the input of educators from across the U.S. and has been designed to satisfy components of standards from the International Society for Technology in Education and the California State Board of Education.
1 - 20 of 61 Next › Last »
Showing 20 items per page