Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged note

Rss Feed Group items tagged

adina sullivan

Digital Citizenship - University of Pittsburgh - 0 views

  •  
    This was a grant obtained by University of Pittsburgh [2001] to promote service-learning as a model for dissemination of Information Technology Literacy. Note that the grant has concluded and site information has not been updated since January 2007.
Anne Bubnic

Cyberbullying Incident Report Forms and Review Process - 0 views

  •  
    What happens when there is a cyberbullying incident at your school? These documents from noted educator and attorney, Nancy Willard, will guide you through the process of documenting the incident, creating a review process and decision-making.
Anne Bubnic

Responding to the Challenge of Online Social Aggression, Threats, and Distress [Book] - 0 views

  •  
    Responding to the Challenge of Online Social Aggression, Threats, and Distress
    This book belongs in every school district! Nancy Willard is Director of the Center for Safe & Responsible Internet Use and a noted expert and speaker on the challenges and legal issues related to technology use in the schools. Her book helps school administrators analyze and intervene in cases involving cyberbullying or cyberthreats. She includes illustrative examples, recommendations for practice, and many practical resources. Available through Amazon.com
adina sullivan

Internet Safety Issues with Joel Gabel - 0 views

  •  
    Notes from presenter Joel Gabel of Google's workshop for the Oklahoma Library Association meeting [12 May 2008] on "Safety on the Internet Highway."
Anne Bubnic

Memphis area students punished for fight on Web - 0 views

  •  
    Another YouTube brawl earns suspension for two girls. Two Southwind Middle School girls were suspended Monday after their locker room fight was posted on the Internet. This follows similar beatings in Indiana and Florida where the acts were committed in order to videotape the event. School principal Marcia Crouch sent a note home to parents Monday afternoon alerting them about the fight and warning them of the school district's zero-tolerance policy regarding such misbehavior.
Anne Bubnic

Tweens Hooked on Phones - 0 views

  •  
    As any parent knows, tweens are crazy about cellphones. Those hoping to delay such a purchase--despite cries of "But everyone else has one!"--take note: 46% of U.S. tweens (ages 8 to 12) use cellphones, but only 26% own them, according to data released Wednesday by Nielsen Mobile. These "mobile borrowers" use their parents' phones when they go out with friends or on short trips, says Sally DePiro, a Nielsen product manager who worked on the report. The borrowing is more than an occasional habit: About 50% take their parents' phones more than three times a week. The key age for these early adopters is 10. While kids start using borrowed cellphones, on average, at around age eight-and-a-half, American tweens generally acquire their own phones between the ages of 10 and 11, reports Nielsen.
Anne Bubnic

Just The Facts: Online Youth Victimization - 0 views

  •  
    Blog from Danah Boyd. Last week, she and three other social scientists participated in an Internet Caucus panel in DC. David Finkelhor (Director of Crimes Against Children Research Center), Amanda Lenhart (PEW), and Michele Ybarra (President of Internet Solutions for Kids) all presented quantitative data. Most of the press coverage of Michele and David's work has been consistently inaccurate in representing the implications of their findings. So they've helped clarify some of the misinterpretations. The Internet Caucus put the video up online so you can view the actual conversation.

    Personal note: David Finkelhor has a great document that helps with clarifying interpretations of his work. He coaches you on what to say. You can download INTERNET SAFETY EDUCATION FOR TEENS: GETTING IT RIGHT and use it for your next presentation!

Anne Bubnic

ReadWriteThink: Fact Fragment Frenzy - 0 views

  •  
    Designed as a research development tool to help students decide how to isolate the important facts in a body of text, this note-taking tool is great for summarizing and paraphrasing practice.
Anne Bubnic

CTAP4 Cybersafety Project - 0 views

  •  
    Note: Diigo is failing to add the final slash needed to access this site. The correct URL is: http://www.ctap4.org/cybersafety/

    The California Technology Assistance Project (CTAP Region IV) is a state-funded agency that has been a leader in cybersafety education for the California public school system since 1997. We have invested hundreds of hours into research on topics related to cybersafety education and curriculum development. We work in partnership with school districts, Safe School Planning teams and the local Educational Advocate for AT&T in the SF Bay Area. We have many great resources posted on our site for educators, parents and kids.

Vicki Davis

Search and Seizure of Cell Phones: Can You Hear Me Now? - 0 views

  • May school officials lawfully “search” the confiscated cell phone to look at stored text messages, photographs, videos, and logs of incoming and outgoing calls? Clearly, the circumstances of the search must satisfy the T.L.O. standard. Not as clear, however, is whether such a search violates federal or Michigan laws regarding stored electronic communications.
  • [A] search of a student by a teacher or other school officials will be ‘justified at its inception’ when there are reasonable grounds for suspecting that the search will turn up evidence that the student has violated or is violating either the law or the rules of the school. Such a search will be permissible in its scope when the measures adopted are reasonably related to the objectives of the search and not excessively intrusive in light of the age and sex of the student and the nature of the infraction.”
  • In Klump v Nazareth Area Sch Dist, 425 F Supp 2d 622 (ED Pa, 2006), a federal district court denied the school’s motion to dismiss a lawsuit filed by a student whose cell phone was searched.
  • ...5 more annotations...
  • compensatory and punitive damages for the alleged unconstitutional search, violation of the Pennsylvania Wiretapping and Electronic Surveillance Control Act, invasion of privacy, and defamation.
  • The court ruled that the student had stated a claim for the alleged violation of his right to be free from an unreasonable search.
  • here was no basis for them to search the text and voice mail messages stored on the phone.
  • unlawful access to the stored voice mail and text message communications.
  • (2) A person shall not willfully and maliciously read or copy any message from any telegraph, telephone line, wire, cable, computer network, computer program, or computer system, or telephone or other electronic medium of communication that the person accessed without authorization. (3) A person shall not willfully and maliciously make unauthorized use of any electronic medium of communication, including the internet or a computer, computer program, computer system, or computer network, or telephone.
  •  
    Legal Implications for Searching Student Cell Phones. Although this article is written against Michigan law, it does help clarify some of the concepts for what is permissable. Note that searching a student's cell phone or wireless device without parent permission may violate state wiretapping laws.
  •  
    Confiscating and looking at information on cell phones by school officials is still not clear. This is a very interesting case study for those working with digital citizenship issues at their school.
  •  
    Fascinating article explaining Michigan take on searching and confiscating cell phones.
Anne Bubnic

Lesson Plan: Life Online - 0 views

  •  
    Digital technology has had a tremendous impact on our lives. Although the Internet and cell phones have been in wide use for only a couple of decades, most of us can hardly remember a time before they existed or imagine how we would function without them. How have the accessibility of these technologies, and the ease with which we are now able to share information, changed the way we communicate? And how can young people in particular better deal with the issues that might arise from being able to communicate so quickly and easily with so many people? This activity will help students recognize and address these issues. Note: Registration for this site may be required, but it's simple and easy.
Anne Bubnic

Using Edmodo in the Classroom: Five Days Later - 1 views

  •  
    Edmodo is a private microblogging platform that teachers and students can use to send notes, links, files, alerts, assignments, and events to each other. This site provides some guidelines for using edmodo in the classroom.
Anne Bubnic

Using Edmodo in the Classroom- - 0 views

  •  
    Edmodo is a private microblogging platform that teachers and students can use to send notes, links, files, alerts, assignments, and events to each other. This site provides some guidelines for using edmodo in the classroom.
Anne Bubnic

Rubric for Blogging - 1 views

  •  
    Teacher notes that the specific criteria and descriptions listed on the rubric have been effective at helping students to improve the posts they have been writing. A google docs version is located here: http://bit.ly/ckQOeR
Anne Bubnic

Mom Hacks Facebook Account; Teen Sues - 1 views

  • It was a mixed blessing that within 24 hours of creating her Facebook page, my kid was harassed unmercifully by a so-called friend — someone she thought was a friend in real life — to the point where she had to unfriend and block other communications from them. I couldn’t have made my case any better about the dangers of social media if I’d paid the obnoxious bully to do it for me.
  •  
    A teen has sued his mother for harassment after she logged into his Facebook account and changed content. He also claims she's made "slanderous" comments about him in Facebook as well. It's important to note that this 16-year-old lives with his grandmother and not his mother, and that he appears to be old enough to drive in his home state of Arkansas.
Anne Bubnic

Facebook Privacy Updated May, 2010 - 8 views

  •  
    Larry Magid gives us an update on how to adjust our Facebook privacy settings. Note: defaults are public. You'll need to reviews all of your settings.
Anne Bubnic

No such thing as "deleted" on the Internet - 0 views

  •  
    Try this: Take a photo and upload it to Facebook, then after a day or so, note what the URL to the picture is (the actual photo, not the page on which the photo resides), and then delete it. Come back a month later and see if the link works. Chances are: It will.
adrinawinslet

Get To Know Your Customers Day Ideas! - 1 views

  •  
    Marketers at 80 percent of brands lack the customer data to drive effective marketing campaigns. Having a clear understanding of your customers is key to reaching your business goals. Here are strategies you can use to get to know your customers better. - Google Analytics - Customer Surveys - Good Old Fashioned Conversations - Leverage Social Media - Hold an Event The idea behind a thank you note is the same behind Get to Know Your Customers Day: In an era where things increasingly are digital and impersonal, going analogue can be a game changer.
buyglobalshop

Buy Verified Paxful Accounts - Get 100% Full Verified Best and cheap ... - 0 views

  •  
    If you've ever utilized the online trading arrange Paxful, you may have come over the term "affirmed account." But what does it truly unfeeling to have a affirmed Paxful account? Fundamentally put, a affirmed account on Paxful infers that the client has gone through a handle of giving additional information and documentation to confirm their identity. This extra step makes a distinction to secure both the buyer and the vender in a trade, ensuring that the person on the other conclusion of the trade is who they say they are. Buy Verified Paxful Accounts Why do I require to affirm my Paxful account? As the world of cryptocurrency continues to expand, stages such as Paxful grant an street for individuals to buy and offer Bitcoin and other computerized financial benchmarks with ease. In any case, in orchestrate to totally utilize the highlights and capabilities publicized by Paxful, clients are regularly required to affirm their accounts. Affirmation is a fundamental step to ensure the security of trades and guarantee both the arrange and its clients from potential blackmail and illegal activities. Buy Verified Paxful Accounts Verifying your Paxful account may show up like an bother at to start with, but it is essential for a number of reasons. Firstly, affirmation makes a distinction to construct up your identity and develop accept interior the community. By affirming your account, you are outlining to other clients that you are a genuine blue and tried and true individual, making it less complex to bolt in in trades with others. Moreover, affirmation is essential for complying with authoritative necessities and ensuring the organize remains in awesome standing with cash related pros. By and large, affirming your Paxful account is a crucial step to ensure a secure and tried and true experience while buying and advertising cryptocurrency. How do I affirm my Paxful account? Verifying your Paxful account is an crucial step in ensuring the security and cleverness
buyglobalshop

Buy Verified Coinbase Accounts - 100% active and safe - 0 views

  •  
    As cryptocurrency picks up more standard acknowledgment, stages like Coinbase have gotten to be well known choices for buying, offering, and putting away computerized monetary standards like Bitcoin and Ethereum. One imperative angle of utilizing Coinbase is the confirmation prepare that clients must go through in arrange to get to full account highlights. A confirmed Coinbase account gives extra security measures and get to to highlights like higher buying limits and the capacity to exchange reserves to outside wallets. Buy Verified Coinbase Accounts What is a confirmed Coinbase account? If you're modern to the world of cryptocurrency exchanging, you may have listened approximately the significance of having a confirmed Coinbase account. But what precisely does it cruel to have a confirmed account on Coinbase? In straightforward terms, a confirmed account on Coinbase is one that has experienced a careful confirmation handle to affirm the personality of the account holder. This confirmation prepare is in put to guarantee the security of the stage and to comply with different administrative requirements. Buy Verified Coinbase Accounts Having a confirmed Coinbase account not as it were gives included security to your account but too opens extra highlights and benefits. With a confirmed account, you can purchase, offer, and exchange a more extensive assortment of cryptocurrencies on the stage. Furthermore, having a confirmed account may moreover make it simpler to store and pull back reserves from your account, as a few installment strategies may as it were be accessible to confirmed clients. In this article, we will dig more profound into what it implies to have a confirmed Coinbase account and how you can go almost confirming your possess account. How do I confirm my Coinbase account? To guarantee the security of your account and comply with administrative prerequisites, Coinbase requires its clients to confirm their characters. Confirming your account is a basi
‹ Previous 21 - 40 of 77 Next › Last »
Showing 20 items per page