Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged need

Rss Feed Group items tagged

Taz Robert

Short Term Cash Loans- Finest Funds To Terminate Your Unplanned Fiscal Expenditure - 0 views

Short term cash loans are most wonderful monetary support for those borrowers who are suffering from sudden fiscal crisis and need the urgent money to fulfill all unforeseen cash worries without an...

short term installment loans installment loans short term cash loans payday loans installment short term loans payday loans

started by Taz Robert on 05 Aug 15 no follow-up yet
Anne Bubnic

Cybersafety in a Web 2.0 World [pdf] - 0 views

  •  
    Cybersafety in a Web 2.0 World: What Parents & Policymakers Need To Know [PDF]

    Interview with the Honorable Melissa Bean, Larry Magid, Nancy Willard and Sharon Miller Cindrich.
Anne Bubnic

Internet troll claims authorship of Megan Meier blog - 0 views

  • Trolls use the Internet to emotionally upset someone they don't know. They typically pick people or issues that, in their view, need to be ridiculed. They don't use their real names and attempt to inflame online discussions by posting outrageous and hurtful comments just to see who will take the bait.Fortuny told the newspaper he created the blog to question the public's hunger for remorse and to challenge the enforceability of cyberspace harassment laws like the one passed in Dardenne Prairie, where 13-year-old Meier had lived. She killed herself in October 2006.
  •  
    The person behind the inflammatory blog "Megan Had it Coming" is a 32-year-old information technology freelancer who lives near Seattle, according to a story about Internet trolls that ran Aug. 3 in The New York Times. Jason Fortuny had no connection with events in Missouri surrounding the 2006 death of Megan Meier. As some had suspected, he is an Internet troll.
Anne Bubnic

You Have to Be a Parent Online Too - 0 views

  • "When we were kids, our parents always told us not to talk to strangers. That was drilled into our heads," he said. "But now, we have to factor in what happens on the Internet."
  • Security settings and parental involvement are especially important in the virtual world, Morris urged. "Check your child's e- mail account on a regular basis. You're the parent; you can do that."
  • While social networking sites like Facebook, Myspace and Xanga can be hot-spots for sexual predators, "not everything about these sites is bad," Morris said, noting some of the most up-to-date information after the NIU shootings was found on Facebook. "Good things do occur, but we need to make sure we're monitoring them," he said. Morris urged the group to keep home computers in plain sight, to outline their expectations and review communications regularly with their children. "We want to build that level of communication with their kids," he said. "If they're talking to someone they shouldn't, we want them to be able to come to us. A child should be able to listen to a parent more than a predator."
  •  
    Parents today have responsibilities in both the real world and the virtual world, Kane County Regional Office of Education Director Phil Morris told the Elgin Academy community Tuesday.
Anne Bubnic

Video Games as Learning Tools? - 0 views

  • One study even looked at whether playing "World of Warcraft," the world's biggest multiplayer online game, can improve scientific thinking. The conclusion? Certain types of video games can have benefits beyond the virtual thrills of blowing up demons or shooting aliens.
  • In one study, 122 fifth-, sixth- and seventh-grade students were asked to think out loud for 20 minutes while playing a game they had never seen before. Researchers studied the statements the children made to see if playing the game improved cognitive and perceptual skills. While older children seemed more interested in just playing the game, younger children showed more of an interest in setting up a series of short-term goals needed to help them learn the game.
  • "The younger kids are focusing more on their planning and problem solving while they are actually playing the game, while adolescents are focusing less on their planning and strategizing and more on the here and now," said researcher and Fordham University psychologist Fran Blumberg. "They're thinking less strategically than the younger kids."
  • ...1 more annotation...
  • Another study compared surgeons who play video games to those who don't. Even after taking into account differences in age, years of medical training and the number of laparoscopic surgeries performed, researchers found an edge for gamer surgeons. "The single best predictor of their skills is how much they had played video games in the past and how much they played now," said Iowa State University psychologist Douglas Gentile. "Those were better predictors of surgical skills than years of training and number of surgeries performed," Gentile said. "So the first question you might ask your surgeon is how many of these [surgeries] have you done and the second question is, 'Are you a gamer?'"
  •  
    Researchers gathering in Boston for the American Psychological Association convention detailed a series of studies suggesting that video games can be powerful learning tools - from increasing the problem solving potential of younger students to improving the suturing skills of laparoscopic surgeons.
Anne Bubnic

Curbing Cyberbullying in School and on the Web - 0 views

  • Many of the most egregious acts of cyberbullying do not take place during school hours or on school networks, a situation that presents a dilemma for public school administrators: If they punish a student for off-campus behavior, they could get hit with a freedom of speech suit.  If they do nothing, students may continue to suffer and school officials theoretically could get hit with failure to act litigation. For school administrators, it appears to be an unfortunate “catch-22.” For lawyers, it’s a “perfect storm,” pitting freedom of speech advocates against the victims of cyberbullying and schools that try to intervene. There are no easy answers in this arena, few laws, and no well-established precedents that specifically deal with cyberbullying.
  • “School administrators can intervene in cyberbullying incidents, even if the incidents do not take place on school grounds, if they can demonstrate that the electronic speech resulted in a substantial disruption to the educational environment.”
  • These cases illustrate not only a lack of precedent on cyberbullying cases, but also a dilemma for school administrators on how to handle cyberbullying.  “There are few laws that address how to handle cyberbullying, and many schools don’t have an internal policy to deal with cyberbullying that takes place off-campus,” offers Deutchman.  “It may take an unfortunate and tragic event on school property to get more schools to consider tackling electronic behavior that originates off campus.  It’s only a matter of time before a cyberbully, or the victim of cyberbullying, uses deadly force during school hours.”
  • ...5 more annotations...
  • So, what should schools do in the meantime?  First, school officials should establish a consistent internal policy (much like a crisis plan) and a team (minimally made up of the principal, school counselor, and technology director) to deal with cyber-misconduct. This team should fully document disruptive incidents and the degree to which the learning environment is affected. The principal should invite the cyberbully’s parents to review the offending material before considering disciplinary action. Most parents at this point will do the right thing.
  • Second, schools should educate children, starting in elementary school, about the importance of cyber-safety and the consequences of cyberbullying, especially on the school’s own network. These rules should be clearly posted in the computer labs and written in age-appropriate language. The rules should be sent home to parents each year—and they should be posted prominently on the school’s website.
  • Third, teachers should continue incorporating in their curriculum projects that utilize the web and other powerful new technologies. This probably won’t help schools avoid lawsuits; it’s just good pedagogy. It’s not surprising that schools that keep up with the latest technology and software—and employ teachers who care about the quality of online communication—report lower incidents of cyber-misconduct.
  • In addition, schools should update their codes of conduct to include rules that can legally govern off-campus electronic communication that significantly disrupts the learning environment. They should also assign enough resources and administrative talent to deal with students who engage in cyber-misconduct. One very big caveat: Disciplining a student for off-campus electronic speech should be done only as a last resort, and certainly not before seeking legal counsel.
  • Finally, schools should realize that not all cyberbullies need to be disciplined. Schools should act reasonably, responsibly, and consistently—so as to avoid the very bullying behavior they are trying to curb. Until the courts provide clear standards in the area of off-campus electronic speech for young people, these recommendations will go a long way in making schools a safer learning environment for everyone.
  •  
    Most school administrators have more than one story to tell about cyberbullying. They report that victims of cyberbullying experience low self-esteem, peer isolation, anxiety, and a drop in their grades. They note that victims may miss class or other school-related activities. Principals also point to recent high-profile cases where cyberbullying, left unchecked, led to suicide. In response, some schools have created new policies and curbed free speech on the school's computer network and on all electronic devices used during school hours. This article offers practical advice for actions schools can take to curb bullying, ranging from policy development to education.
Anne Bubnic

Coming Soon: A National Center for Edtech Research - 0 views

  • The National Center for Research in Advanced Information and Digital Technologies is part of the reauthorization of the Higher Education Act, approved by Congress at the end of July, and signed into law by President Bush on August 14.
  • The purpose of the Center shall be to support a comprehensive research and development program to harness the increasing capacity of advanced information and digital technologies to improve all levels of learning and education, formal and informal, in order to provide Americans with the knowledge and skills needed to compete in the global economy…
  •  
    This past week, President Bush signed into law a bill that will establish a new national research center for studying digital technology and learning. The center aspires be to edtech what the National Institutes of Health have been for medical research.
Judy Echeandia

Teacher-student Web friendships restricted by Lamar school board - 0 views

  • "The only intent is to limit the personal communication between teachers and students. We don't need to let it cross the line between professional and personal communication."
  •  
    Teachers and students in Lamar County, Mississippi, can't be Internet friends this year after the School Board revamped rules prohibiting them from being friends through online social networks.
Anne Bubnic

Sexting: fears as teens targeted - 0 views

  • The full extent of sexting has not been quantified, but a survey by a teenage girls' magazine found 40 per cent of respondents had been asked to send sexual images of themselves.
  • Police say sexting rates are already high, while Kids Help Line says nearly half their bullying-related calls can be attributed to cyber-bullying.
  • etective Sergeant Campbell Davis, of the Victoria Police internet child exploitation team, said girls were especially targeted, and the third-generation of mobile phone technology, or 3G, which can send large image files straight to the internet, was exacerbating the problem. "It is a very powerful technology and we need to teach our children how quickly images can be forwarded," he said.
  •  
    The new mobile phone phenomenon, dubbed "sexting", led to 32 Victorian [Australia] teenagers being charged with child pornography offenses last year.
Anne Bubnic

The Road to Cybersafety - 0 views

  • Carrill is part of the Platte County Sheriff’s Office. He also leads the Western Missouri Cyber Crimes Task Force. One of his primary missions is to track down and arrest online predators who trade in child pornography.And all these cameras only make his job more challenging. About 40 percent of the nation’s minors have access to Webcams, Carrill explained, devices for uploading live video to the Internet. About 65 percent of all children have access to cell phone cameras.
  • erhaps the biggest issue is that fact that kids don’t understand that when a picture is posted online, it’s nearly impossible to remove.“Once that image is taken, it’s out there forever,” Shehan said. “The No. 1 issue that we’ve seen with Webcams is teenagers self-producing pornography.”
  • All we can tell them is, ‘I’m sorry,’” Carrill said. “The minute the camera clicks, you no longer own that image. It has the potential to harm that person years from now.”A Webcam placed in a child’s bedroom is another bad combination, according to Shehan and Carrill. Sexual predators search for kids who use Webcams in the privacy of their own rooms, then lure or blackmail the child into providing pictures of themselves.“We see cases time after time of children who take pictures, send them to a predator and get a pornographic collage back that the predator uses to blackmail the child into providing more images,” Shehan said.
  • ...3 more annotations...
  • . About 40 percent of the nation’s minors have access to Webcams, Carrill explained, devices for uploading live video to the Internet. About 65 percent of all children have access to cell phone cameras.Carrill’s team recently started a new operation to search image-trading Web sites for known child pornography in Missouri. The results were frightening, he said. More than 6,000 images were found in the state; about 700 of those pictures were downloaded in the Kansas City area.Between sexual predators who fish for images and immature decisions by kids with cameras, more children are either having their images posted online or being exposed to pornography, according to a 2006 report by the National Center for Missing and Exploited Children.
  • In the end, the best tool to defeat child pornography is parent education, according to both Shehan and Carrill. More than anything, kids need to know they can trust their parents.“It’s through that open line of communication between the parent and child that they can work through or prevent bad situations,” Carrill said.
  • All parents should follow a few basic rules when it comes to cyber safety, according to experts:- Keep computers in common areas of the home.- Monitor Internet use by children.- Enable privacy protection software.- Turn Webcams off or protect them with a password.- Track what images are being uploaded by children in the household.- Talk to children about what is appropriate.
  •  
    Webcams, cell phone cameras being put to troubling use, experts say. People are taking pictures, lots of them, and then uploading them as permanent displays in the Internet collection.
Anne Bubnic

Many new 'friends' to be made online, but what about dollars? - 0 views

  • Even Google has failed to extend its golden touch to social-networking sites. In 2006 Google paid MySpace $900 million to place ads on its pages. The search giant also operates its own social network, Orkut, which has been growing, especially outside the US. But in a February call with financial analysts, Google cofounder Sergey Brin conceded that the investments “didn’t pan out as well as we had hoped…. I don’t think we have the killer best way to advertise and monetize the social networks yet.”
  • “People clearly, especially on the social networks, [are] not particularly interested in clicking on the ads,” says Mr. Brooks, who as editor of socialnetworkingwatch.com has followed the online industry for a decade. “Advertising needs to evolve, and social networks are forcing this change. People are really tired of being assaulted [by ads], but they still love to buy.”
  • As users share personal information within their networks, companies have an opportunity to capture and employ this data for targeted marketing. Social networks are building huge databases about where users go and the people they connect with, says Fred Stutzman, a doctoral candidate at the University of North Carolina who studies social networks.
  •  
    Social Networks may be on the increase in populations, but marketers still struggle with how to get users to respond to advertising.
Anne Bubnic

Identity Theft Resource Center | Teen Space - 1 views

  •  
    Identity theft can affect everyone, including teenagers. It is important for you to know what information is needed to steal your identity and the best ways of protecting your information. Your information, in the wrong hands, can 'jack your life!' The site includes lesson plans, games and a video.
Judy Echeandia

Cyberstalkers -- Today's Wild West Villains - 0 views

  • Education is the key. Teach children safe practices for online use. Help them learn to spot the dangerous alleyways of that Internet boomtown. They need to learn who the law is, and who the desperados are.
  •  
    Do kids really know who they are communicating with online? Posting too much personal information online makes it easy for internet users, posing as friends, to gather details about personal lives that could be used in unintended ways.
Anne Bubnic

Our Kids Are Failing - And It's All Wikipedia's Fault! - 0 views

  • n. Yesterday, news broke out in Scotland about how the internet was to blame for Scotland's failing exam pass rates. According to the Scottish Parent Teacher Council (SPTC), Wikipedia, among other sources, was cited as the reason as to why the students were failing. Is this a case of the internet making us stupid? Or do students just need to learn how to use the new research tools of the web a little more appropriately?
  • Children are very IT-savvy, but they are rubbish at researching." She noted that today's students do the majority of their research online instead of using books or other resources that could be found at the library.
  •  
    Children may be net savvy but their critical reading and research skills are not finely honed. They don't understand that they shouldn't believe everything they read. To kids, WIKIPEDIA is still the gospel.
Vicki Davis

Susan Silverman's Lucky Ladybugs project going on for elementary - 0 views

  • A Collaborative Internet Project for K-5 Students
  • Essential Question: Why are ladybugs considered to be good luck?
  • This project will demonstrate lesson plans designed following principles of Universal Design for Learning (UDL) and examples of student work resulting from the lessons.  As teachers we should ask ourselves if there are any barriers to our students’ learning.  We should look for ways to present information and assess learning in non-text-based formats. 
  • ...5 more annotations...
  • Based on brain research and new media, the UDL framework proposes that educators design lessons with three basic kinds of flexibility: 1. Multiple formats and media are used to present information.
  • Examples: Illustrations, pictures, diagrams, video or audio clips, and descriptions 2.   Teachers use multiple strategies to engage and motivate students. 3.   Students demonstrate learning through multiple performance and product formats.
  • UDL calls for three goals to consider in designing lessons: 1.  Recognition goals: these focus on specific content that ask a student to identify who, what, where, and when. 2.  Strategic goals: these focus on a specific process or medium that asks a student to learn how to do something using problem solving and critical think skills. 3. Affective goals: these focus on a particular value or emotional outcome. Do students enjoy, and appreciate learning about the topic? Does it connect to prior knowledge and experience? Are students allowed to select and discover new knowledge?
  • Resources you might want to use: Scholastic Keys, Kid Pix, Inspiration and Kidspiration, digital camera (still and video), recording narration/music, United Streaming.  Let your imagination go!
  • This project begins on March 15, 2007.  Materials need to be e-mailed by May 31, 2008.
  •  
    An excellent project for elementary students to connect with other classes.
  •  
    A great way to get started with technology is to join in an exciting project. this project by Susan Silverman was designed using the principles of Universal Design for Learning. I've heard her present and she is a pro. (Along with my friend Jennifer Wagner.)
Vicki Davis

"Unprecedented Force for Change"-Dan Tapscott's Keynote - Horizon Project 2008 - 0 views

  • Teachers are no longer “transmitters of data,” but active participants in the student’s learning process.
    • Vicki Davis
       
      I think this comment is an important one to understand as we advocate for Student success as well.
  • with our advanced, technological world, we must not only acknowledge the new technologies emerging but we must gain knowledge on how to use them.
  • f school became an interactive place where both students and teachers put their two cents in: teachers teaching students, students teaching students, teachers sharing ideas and students executing these ideas-school would be great. If we all focus on change and ways to make interactive learning better we could reach so many people! Not only can we interact with each other but we can raise awareness and pose solutions on the many issues regarding education.
  • ...2 more annotations...
  • I really agree with both of what you two are saying, but my question remains, (in an attempt not to sound too cynical): how is this going to happen? I know that Dan Tapscott seeks to view change in the education system, but my question is, how is this going to happen?
  • but the real issue is, in so many places education is rigid and all about regurgitation of information. How do we look past that? Is it a mindset that we need to learn how to transgress, or is it a gradually changing aspect?
« First ‹ Previous 281 - 300 of 404 Next › Last »
Showing 20 items per page