Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged need

Rss Feed Group items tagged

Lorna Costantini

Ideas and Thoughts from an EdTech [Blog Archive] - 0 views

  • Her reaction was to block all these sites, ban her daughter from the home computer and demand the school district to install content filtering that would prohibit any access to social networks.
    • Rafael Ribas
       
      Exactly the kind of reaction an uneducated parent would have - away from my child!
  • social networking should be taught in the homes
  • Teachers are our best filters at school
    • Rafael Ribas
       
      Hear hear! That is exactly what we need to say loud and clear
  •  
    Very interesting post by Dan Shareski on the connections between parents, school districts, students and the internet.
  •  
    podcast outlining a parent's fears about non filtering of Facebook at school
Anne Bubnic

What Are We Protecting Them From? - 0 views

  •  
    By mandating schools restrict internet access, CIPA and other federal and state legislation intend to guard students' safety online-but all they may be doing is keeping vital educational technology out of the classroom. No one disputes the need to protect kids from the harm that lurks online. What's at issue is whether or not mandated internet filters are the best way to achieve those safeguards-or whether the filters aren't up to the task and are actually interfering with the educational mission by obstructing use of important Web 2.0 tools.
Anne Bubnic

Schools' cyber security needs improvement - 0 views

  •  
    School districts are improving their physical security, but they might be neglecting the security of their computer infrastructure, if the results of an annual survey are any indication. The average physical safety rating of K-12 school districts improved by 39 percent over 2007, while the average cyber safety rating declined by 25 percent during the same time period, according to CDW-G's "2008 School Safety Index," which is designed to mark the current state of K-12 school safety.
Lucy Gray

Review of Frontline: Growing Up Online - 0 views

  •  
    I'm surprised by this review of the Frontline program. I would have thought Eric would have been more critical. I agree that it's an important show to watch; however, I was concerned with a few things. One, I was concerned with the portrayal of a "helicopter" mom who wanted her kids' social networking passwords in case of emergency and I was also concerned about the kid who very cavelierly said he never read books. I also really wondered about parents who complained that their kids never turned off their cellphones at dinner time. I need to re-watch this program, but I think there is much here to be discussed that's not about the technology. It's about how we talk to and engage our students and children. It's really easy to blame bad behavior and scary incidents on technology.
  •  
    [February 08] A summary of each chapter and commentary provided by Eric Grant.
Ziggy U

Does your password pass the test? - 0 views

  •  
    Do we all need to be that careful about our passwords? Probably not. But passwords are one of the web's most important security tools. Whether it's for your Google account, your banking center, or your favorite store, choosing a good password and keeping it safe can go a long way toward protecting your information online.
  •  
    Advice from Google engineers on generating secure passwords.
Anne Bubnic

Is Education 1.0 Ready for Web 2.0 Students? - 0 views

  •  
    In his article, Thompson offers an exploration of the meaning and application of Web 2.0; evaluates how Net Generation students, who will enter the classroom with Web 2.0 expectations and experiences, will reshape institutions of higher education and their practices; and examines what some of these IHEs are specifically doing to meet the needs of the next generation of students. Thompson suggest that in order to move our educational practices forward, it is incumbent upon us to recognize and react to our changing student population.
Anne Bubnic

Parent Permission Sample for Read/Write Activities on the Web - 0 views

  •  
    This form is powered by Wufoo Online forms and is a 'guide' to getting parent permission at the teacher level to allow students to participate in read/write activities. It is not a 'policy'. You will need to produce a printed version to ensure that you have a signature. Ensure that you provide adequate opportunity for parents to contact you with questions or express an interest in parental education about the read/write web.
Vicki Davis

Reflection - Horizon Project 2008 - 0 views

  •  
    This 10th grade student has written an exceptional post-project reflection. I hope you'll take time to read it. Here is an excerpt:\n\n"There is no doubt that this technology is dangerous. It is apparent that few people, not adults, not teenagers, truly understand how collaboration, conduct, and manners affect the internet. This project has to teach others that as well. It is necessary to know how to handle yourself on the internet. That's why Horizon Project is so important. We have to educate tomorrow's leaders how to use new technology without abusing it. The highlight of this project is the education we are giving every single person who has been a part of the Horizon Project."
  •  
    An excellent post about how doing global collaborative projects can educate students on the safety they need. This is from a 10th grader.
Anne Bubnic

Blocking the Future [AASA] - 1 views

  • In this environment, school district leaders have a critical choice to make: Will their schools pro-actively model and teach the safe and appropriate use of these digital tools or will they reactively block them out and leave students and families to fend for themselves?
  • o better way to highlight organizational unimportance than to block out the tools that are transforming the rest of society.
  • the specific policies are much less important than the general mindset of the school district.
  • ...4 more annotations...
  • If a district has decided to figure out ways to facilitate technology usage and empower students and staff, the policies will follow accordingly. Conversely, if a district is determined to treat technology from a fearful or wary standpoint, its policies will reflect that position as well.
  • they do have to exercise appropriate oversight and convey the message, repeatedly and often, that frequent, appropriate technology usage is both important and expected.
  • they have the right mindset. Their first reaction is not “keep this out” but rather “how we can make this work?” We can learn from these organizations how they have balanced safety concerns with the need to empower students with 21st century skills and dispositions.
  • lease don’t relegate your students, particularly those from disadvantaged backgrounds, to second-class status in the new economy because you left it to them and their families to figure out on their own what it means to be digital, global citizens.
  •  
    [May 2008] AASA article gives examples of school organizations that are desperately and inappropriately blocking the future and Scott McLeod pleads, "Please don't block the future." Please don't relegate your students, particularly those from disadvantaged backgrounds, to second-class status in the new economy because you left it to them and their families to figure out on their own what it means to be digital, global citizens. Ask AASA and its state affiliates to provide more technology leadership-related professional development opportunities. And let us know how we can help.
Anne Bubnic

WebTools4u2use [Library Media Specialists Wiki] - 1 views

  •  
    This wiki was created for school library media specialists by Dr. Donna Baumbach and Dr. Judy Lee, University of Central Florida. The purpose is to provide information about some of the new web-based tools (Web 2.0) and how they can be used and are being used by school library media specialists and their students and teachers. Much of the information--including identifying a need for this kind of information--is the result of a survey conducted in 2008 of over 600 school library media specialists about their knowledge and use of web-based tools in library media programs.
Anne Bubnic

Six Things Parents Need to Know About Cyberbullying [Vanessa Van Petten] - 0 views

  •  
    The Internet has changed the playground bully into the in-my-bedroom-bully. It's true; the line between school life and home life is gone. Kids can no longer leave the social pressures, cliques, bullies, snootiness and the other highlights of adolescence at school.
Vicki Davis

Twitter gets you fired in 140 characters or less - 0 views

  • Clay Shirky speaks of a day in the not-too-distant future when human resources departments will have the wisdom to look beyond social networking faux pas — at least in some small part because by then, everyone will have made at least one.
  • Rep. Pete Hoekstra, R-Mich., tweeted this as-it-happens update regarding his group’s location and destination:"Moved into green zone by helicopter Iraqi flag now over palace. Headed to new US embassy Appears calmer less chaotic than previous here."
  • This social networking comedy of errors spread like dancing hamsters across Twitter. In the retelling, "theconnor" earned the nick, "Cisco Fatty." Before the work day ended, Web sleuths revealed "theconnor's" true identity. "Theconnor" was lampooned in a popular YouTube meme. And thanks to Google Cache, the deleted content of "theconnor’s" homepage resurfaced on CiscoFatty.com, a Web site erected to commemorate this cautionary tale.
  •  
    Students need to understand that NOTHING, I repeat NOTHING Is private. Great case study about how 140 characters got someone fired before they were even hired.
Anne Bubnic

Fact or Folly - For Teachers | Introduction - 0 views

  • But the Internet is different. In most cases it has no such gatekeepers: anyone and everyone can appear to be an "expert." So to get the most out of the Internet, students need to learn two things: first, how to find good information online; and second, how to evaluate the information they find.
  • Using the template The Five Ws of Cyberspace as a guide, young people can examine the authorship, purpose, perspective and presentation of Web sites, in order to determine their credibility.
  • Deconstructing Web Pages provides a step-by-step application of the five Ws to an actual Web site - with some interesting results.
  • ...1 more annotation...
  • And finally, Quick Tips for Authenticating Online Information offers some simple and effective strategies for assessing sites.
  •  
    Anybody can post information on the Internet, making it possible to find "proof" of any ideas or beliefs you can imagine. Yet to many students, "If it's on the Internet, it must be true."
Chris Hoelzer

Technology Integration Matrix - 0 views

  • The Technology Integration Matrix (TIM) illustrates how teachers can use technology to enhance learning for K-12 students. The TIM incorporates five interdependent characteristics of meaningful learning environments: active, constructive, goal directed (i.e., reflective), authentic, and collaborative (Jonassen, Howland, Moore, & Marra, 2003). The TIM associates five levels of technology integration (i.e., entry, adoption, adaptation, infusion, and transformation) with each of the five characteristics of meaningful learning environments. Together, the five levels of technology integration and the five characteristics of meaningful learning environments create a matrix of 25 cells as illustrated below.
  • Levels of Technology Integration into the Curriculum
  • Basic technology skills and integration of technology into the curriculum go hand-in-hand to form teacher technology literacy.
    • Chris Hoelzer
       
      To often we ask teachers to impliment technology tools without the proper explanation or PD.
  • ...2 more annotations...
  • professional development planning and needs assessment resource
  • evaluate teachers’ current levels of proficiency with technology
  •  
    Technology integration matrix from Florida. This amazing resource was picked up from Lucy Gray. Really amazing.
  • ...1 more comment...
  •  
    This technology matrix is just a great example of what Florida is looking at doing.
  •  
    This is a great guide. I would love to use something like this as a model for how we develop our PD.
  •  
    The Technology Integration Matrix (TIM) illustrates how teachers can use technology to enhance learning for K-12 students
anonymous

Online Predators and Their Victims - 0 views

  • My (Liz B. Davis ) Summary of Key Points (All are quotes directly from the article): Online "Predators" and Their Victims. Myths, Realities, and Implications for Prevention and Treatment. by: Janis Wolak, David Finkelhor, and Kimberly J. Mitchell - University of New Hampshire and Michele L. Ybarra - Internet Solutions for Kids, Inc.
  • The publicity about online"predators" who prey on naive children using trickery and violence is largely inaccurate.
  • adult offenders who meet, develop relationships with, and openly seduce underage teenagers
  • ...21 more annotations...
  • In the great majority of cases, victims are aware they are conversing online with adults. In the N-JOV Study, only 5% of offenders pretended to be teens when they met potential victims online. (112)
  • Offenders rarely deceive victims about their sexual interests.
  • promises of love and romance
  • 99% of victims of Internet-initiated sex crimes in the N-JOV Study were 13 to 17 years old, and none were younger than 12. 48% were 13 or 14 years old. (115)
  • it was those 15-17 years of age who were most prone to take risks involving privacy and contact with unknown people. (115)
  • take place in isolation and secrecy, outside of oversight by peers, family  members, and others in the youth's face-to-face social networks (115)
  • Most of the online child molesters described in the N-JOV Study met their victims in chatrooms. In a 2006 study, about one third of youths who received online sexual solicitation had received them in chatrooms. (116)
  • Youth internet users with histories of offline sexual or physical abuse appear to be considerably more likely to receive online aggressive sexual solicitations. (117)
  • ..Although Internet safety advocates worry that posting personal information exposes youths to online molesters, we have not found empirical evidence that supports this concern. It is interactive behaviors, such as conversing online with unknown people about sex, that more clearly create risk. (117)
  • Online molesters do not appear to be stalking unsuspecting victims but rather continuing to seek youths who are susceptible to seduction. (117)
  • maintaining online blogs or journals, which are similar to social networking sites in that they often include considerable amounts of personal information and pictures, is not related to receiving aggressive sexual solicitation unless youths also interact online with unknown people. (117)
  • Boys constitute 25% of victims in Internet-initiated sex crimes, and virtually all of their offenders are male. (118
  • Some gay boys turn to the internet to find answers to questions about sexuality or meet potential romantic partners, and there they may encounter adults who exploit them. (118)
  • ..child molesters are, in reality, a diverse group that cannot be accurately characterized with one-dimensional labels. (118)
  • Online child molesters are generally not pedophiles. (118)Online child molesters are rarely violent. (119)
  • Child pornography production is also an aspect of Internet-initiated sex crimes. One in five online child molesters in the N-JOV Study took sexually suggestive or explicit photographs of victims or convinced victims to take such photographs of themselves or friends. (120)
  • Youths may be more willing to talk extensively and about more intimate matters with adults online than in face-to-face environments. (121
  • it may not be clear to many adolescents and adults that relationships between adults and underage adolescents are criminal. (122)
  • Simply urging parents and guardians to control, watch, or educate their children may not be effective in many situations. The adolescents who tend to be the victims of Internet-initiated sex crimes many not themselves be very receptive to the advice and supervision of parents. (122)
  • We recommend educating youths frankly about the dynamics of Internet-initiated and other nonforcible sex crimes. Youths need candid, direct discussions about seduction and how some adults deliberately evoke and then exploit the compelling feelings that sexual arousal can induce. (122)
    • anonymous
       
      Let's remember that although there are direct references to gay and male pedophiles of gay boys, that 99% of child sex offenders identify as heterosexual, online or offline.
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
  •  
    This research article has the facts about sexual predatory behavior.
Judy Echeandia

bNetS@vvy! Issue 6: Learning to Live with Texting - 0 views

  •  
    bNetS@vvy is a bimonthly publication of the National Education Association Health Information Network (NEA HIN), the National Center for Missing & Exploited Children, and Sprint. The bilingual newsletter provides resources from a range of perspectives to help adults understand the problem and connect with young teens to reduce the risks that they will become bullies or victims online. Lawyers, School Psychologists, Classroom Teachers and Teens contribute to the bi-monthly publication. Recent issues have covered Cyberbullying topics and Web 2.0
  •  
    This issue of bNets@vvy focuses on texting and includes articles on: Understanding the Benefits and Risks of Texting, A Pediatrician's Advice for Managing Your Child's Texting Activity, Parents Share Their Strategies for Managing Kids' Texting Behavior, A Teen Talks About Texting and What Parents/Educators Need to Know About It, What's Up with Texting? A Teacher Asks Her Students to Clue Her In
Anne Bubnic

How to Use Social-Networking Technology for Learning | Edutopia - 4 views

  •  
    Schools should reflect the world we live in today. And we live in a social world. We need to teach students how to be effective collaborators in that world, how to interact with people around them, how to be engaged, informed twenty-first-century citizens.
Anne Bubnic

Digital Citizenship: Connecting education, learning & living in the 21st Century - 4 views

  •  
    Connecting education, learning & living in the 21st Century: How, why, and what we need to do differently.
Anne Bubnic

Diigo Lists of Digital Cybercitizenship Topics & Resources - 4 views

  •  
    Are you planning your digital curriculum? These handy lists will help you quickly find what you need.
Anne Bubnic

Cybersecurity, Safety and Ethics Education Falls Short in U.S. Schools - 4 views

  • The survey also found a high reliance on shielding students instead of teaching behaviors for safe and secure Internet use. More than 90% of schools have built up digital defenses, such as filtering and blocking social network sites, to protect children on school networks. While these defenses may help reduce the online risks children face at school, they do not prepare students to act more safely and responsibly when accessing the Internet at home or via mobile devices.
  •  
    The study illuminates that there is no cohesive effort to provide young people the education they need to safely and securely navigate the digital age and prepare them as digital citizens and employees.
« First ‹ Previous 301 - 320 of 404 Next › Last »
Showing 20 items per page