Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged number

Rss Feed Group items tagged

Anne Bubnic

The Millennials Are Coming! - 0 views

  • Most agencies manage sensitive citizen data: addresses, Social Security numbers, financial records and medical information. You name it, some state or local office has it, and probably electronically. The problem? Many theorize that the Millennials' penchant for online openness could unintentionally expose private information, leaving it ripe for the picking. Millennials bring innovative ideas about technology's use, but for that same reason, do they also pose new security risks?
  • Anti-virus vendor Symantec released a study in March 2008 assessing this issue. Symantec commissioned Applied Research-West to execute the study, and 600 participants were surveyed from different verticals, including government. Survey participants included 200 IT decision-makers, 200 Millennial workers and 200 non-Millennial workers born before 1980. The data revealed that Millennials are more likely than workers of other ages to use Web 2.0 applications on company time and equipment. Some interesting figures include: 69 percent of surveyed Millennials will use whatever application, device or technology they want at work, regardless of office IT policies; and only 45 percent of Millennials stick to company-issued devices or software, compared to 70 percent of non-Millennials.
  • How might young people be workplace assets? Could all that time typing or texting make them speedy typists, able to whip up memos at the drop of a hat? Does familiarity with new and emerging technologies have its benefit? You bet, according to Dustin Lanier, director of the Texas Council on Competitive Government. The council brings state leaders together to shape policy for government departments, including IT. "I think they've built an approach to work that involves a lot of multitasking," Lanier said of the Millennials. "Something will be loading on one screen, you alt-tab to another application and pull up an e-mail, the first process loads, you flip back, start a new process, flip to a forum and pull up a topic. It's frenetic but normal to that group." Lanier doesn't think Millennials present more of an IT threat than their older co-workers. After all, young people don't have a monopoly on being distracted in the office. "I can't tell you how many times I've walked by people's desks of all ages and seen Minesweeper up," he said. He thinks employers should embrace some Web 2.0 applications. Otherwise, Millennials might be discouraged from sticking around. According to Lanier, this younger work force comprises many people who think of themselves as free agents. Government should accommodate some of their habits in order to prevent them from quitting.
  •  
    Get ready CIOs. They're coming. They have gadgets and doohickeys galore. They like their music downloadable and portable, and they grew up with the Internet, not before it. Their idea of community is socializing with people in other cities or countries through Facebook, MySpace or instant messages, and they use e-mail so often they probably think snail mail is an endangered species. They're the Millennials - those tech-savvy, 20-somethings and-under bound to warm up scores of office chairs left cold by retiring baby boomers. There's a good chance many will come to a government workplace near you, but their digital literacy could prove worrisome for security-conscious bosses.
Anne Bubnic

Cybersafety Assembly causes controversy on first day of high school - 0 views

  • John Gay, a police officer for the Cheyenne Police Department in Wyoming, volunteered at the request of Windsor High School principal Rick Porter to speak to students at two assemblies about the dangers of predators surfing social networking Web sites such as MySpace and Facebook.Gay shared how he could pull pictures off of Windsor High School students who had their own MySpace and Facebook pages. Nordic’s daughter, Shaylah, was one of the students Gay singled out to the point where Shaylah left the auditorium in tears.
  • Shaylah said Gay showed the other students her phone number, read her blogs and comments out loud.
  • He kept on picking at her and picking at her and picking at her and everyone said, ‘That’s harassment,’ ” Weakland said.
  • ...2 more annotations...
  • “Officer Gay chose it as an opportunity to take Shaylah’s pictures and her MySpace and use it as an example of what not to do, but then just really publicly humiliate her and mocked her,” said Nordic, who coaches wrestling at the high school and football and track at Windsor Middle School. “She left the auditorium in tears and busted out crying. He told the student body that he took her information from MySpace and showed it to a predator in prison and asked him what he would do with it.”
  • “You could imagine her sitting there and hearing that,” Nordic said. “He asked everybody there, ‘Is Shaylah Nordic here?’ So she raised her hand and then he went on to post the pictures and talk about it. He said she was likely to be raped and murdered because how easy it was to access this stuff, and how easy it was to get information.”
  •  
    Ty Nordic understands the need to inform kids about the dangers of sexual predators on the Internet. But when his 16-year-old daughter was targeted during an assembly at Windsor High School on the first day of school Tuesday afternoon, Nordic was left with plenty of unanswered questions for the presenter whom he said used inappropriate language during the assembly and singled out specific students.
Anne Bubnic

Thx 4 the gr8 intrvu! - 0 views

  • Hiring managers like Johnson say an increasing number of job hunters are just too casual when it comes to communicating about career opportunities in cyberspace and on mobile devices. Thank-yous on paper aren't necessary, but some applicants are writing e-mails that contain shorthand language and decorative symbols, while others are sending hasty and poorly thought-out messages to and from mobile devices. Job hunters are also using social-networking sites like Facebook and MySpace to try to befriend less-than-willing interviewers.
  •  
    After interviewing a college student in June, Tory Johnson thought she had found the qualified and enthusiastic intern she craved for her small recruiting firm. Then she received the candidate's thank-you note, laced with words like "hiya" and "thanx," along with three exclamation points and a smiley-face emoticon. "That e-mail just ruined it for me," says Johnson, president of New York-based Women For Hire Inc. "This looks like a text message."
Anne Bubnic

Humiliation and gossip are weapons of the cyberbully - 0 views

  • ead teachers are being advised to draw up new rules on mobile phone use amid a growing number of cases of what is now known as “cyber-bullying”. In many secondary schools, over 90% of bullying cases are through text messages or internet chatrooms. It is hoped that the rules about mobile phone use will protect children from abusive texts, stop phones going off in class and prevent mobiles being taken into exam halls.
  • Although the majority of kids who are harassed online aren’t physically bothered in person, the cyber-bully still takes a heavy emotional toll on his or her victims. Kids who are targeted online are more likely to get a detention or be suspended, skip school and experience emotional distress, the medical journal reports. Teenagers who receive rude or nasty comments via text messages are six times more likely to say they feel unsafe at school.
  • The problem is that bullying is still perceived by many educators and parents as a problem that involves physical contact. Most enforcement efforts focus on bullying in school classrooms, corridors and toilets. But given that 80% of adolescents use mobile phones or computers, “social interactions have increasingly moved from personal contact at school to virtual contact in the chatroom,'’ write Kirk R. Williams and Nancy G. Guerra, co-authors of one of the journal reports. “Internet bullying has emerged as a new and growing form of social cruelty.'’
  • ...1 more annotation...
  • Cyber-bullying tactics include humiliation, destructive messages, gossip, slander and other “virtual taunts” communicated through e-mail, instant messaging, chatrooms and blogs. The problem, of course, is what to do about it. While most schools do not allow pupils to use their mobiles in the school building, an outright ban is deemed unworkable. Advances in technology are throwing up new problems for teachers to deal with. Children use their phones to listen to music, tell the time or as a calculator. Cyber-bullies sometimes disclose victims' personal data on websites or forums, or may even attempt to assume the identity of their victim for the purpose of publishing material in their name that defames them or exposes them to ridicule.
  •  
    As more and more people have access to computers and mobile phones, a new risk to youngsters has begun to emerge. Electronic aggression, in the form of threatening text messages and the spread of online rumours on social networking sites, is a growing concern.
Anne Bubnic

Growing Pains at Yearbook.com - 0 views

  • Sometimes gritty and often silly, MyYearbook.com is a popular social networking forum for teens who want to flirt, post poetry and compete in photo and video "battles." They vie to be voted "best looking" and to display the "best tattoo or piercing." This uninhibited site--subjects cover everything from fashion to incest--attracts eyeballs.
  • MyYearbook had 4.5 million unique visitors in June, a 36% increase in a year, says ComScore (nasdaq: SCOR - news - people ). The number of MyYearbook pages viewed that month climbed fivefold from the year before, to 1.3 billion. Piczo, a similar teen site, had 1.4 million unique visitors and 81 million page views.
  • MyYearbook, created in 2005, had very little advertising until last year. Now, with marketers interested in tapping into the unguarded gabfest, MyYearbook's founders--siblings Geoffrey, David and Catherine Cook--want to exploit the conversations without turning users off.
  • ...1 more annotation...
  • Last year MyYearbook lost $1.8 million on revenue of $2.5 million. With money now coming in from such advertisers as Nikon, Netflix (nasdaq: NFLX - news - people ) and Paramount Pictures, the Cooks expect the company to become profitable this year.
  •  
    Teens use MyYearbook.com as an online confessional. Can its founders make money from the freewheeling chatfest without turning users off?
Vicki Davis

Children Online: Getting Younger and Continuing to Take Risks - 0 views

  • 16% posted personal interests 15% posted information about their physical activities 20% gave out their real name 5% posted information about their school 6% posted their home address 6% posted their phone number 9% posted a photograph of themselves
    • Vicki Davis
       
      Again, education is so important of both students and parents.
  •  
    A 2007-2008 research study conducted by Rochester Institute of Technology (RIT) reported several key findings that indicate children are logging on to the Internet at a very young age. Parental supervision of this computer activity, however, is generally lax. Not surprisingly, the study found that children are communicating with friends, peers, and others online in ways that show a lack of knowledge in what is ethical, safe behavior.
Anne Bubnic

Teacher Magazine: Cellphones Evolve Into Instructional Tool - 2 views

  •  
    Leonard's class at Wiregrass Ranch High School in Wesley Chapel, a middle-class Florida suburb about 30 miles north of Tampa, is one of a growing number around the country that are abandoning traditional policies of cell phone prohibition and incorporating them into class lessons.
Anne Bubnic

How Privacy Vanishes Online, a Bit at a Time - 1 views

  •  
    If a stranger came up to you on the street, would you give him your name, Social Security number and e-mail address? Probably not. Yet people often dole out all kinds of personal information on the Internet that allows such identifying data to be deduced.
Anne Bubnic

Do your kids use Formspring.me? - 5 views

  • Conversations on each page quickly degenerated into some general types of questions/comments: “I hate you” comments were remarkably prevalent. I saw people calling each other names that I wouldn’t use around my closest friends. Moreover, the frequency of these comments was staggering. In a lot of ways, this site more or less encourages cyber-bullying, and does it in a public space. “You’re awesome” comments are much less disturbing, but encourage a pretty self-centered view on life. For example, I saw a few comments such as, “Why are people judging you? You’re so nice!” Not surprisingly, the students in question respond with statements about how they are good people that don’t judge other people but that other people actually judge them. Questions/comments about sex. Every question that can be asked about a person’s sexual history, preference, etc. is being discussed in public for the world to see. Like I said – I’ll never look at some kids the same way again. This site allows a space for kids to do discuss these things in an uncontrolled environment without talking about issues with parents or teachers or people who may have a little more experience and wisdom. Think MySpace encouraged risky behavior? Looking at two pages on Formspring, I saw full names, cities, and cell phone numbers posted for all the world to see. At our school, we try to teach kids what information to put out there and to be responsible citizens of the internet. Apparently our lessons aren’t sticking.
  •  
    Formspring.me, has the potential to be more dangerous to students than most other websites I've heard of. Just to give you an idea of it's prevalence, I took a quick poll of my 8th graders. About 1/3 have a Formspring page. About 3/4 know about Formspring.me.
  •  
    I appreciate your sharing this!
jason ohler

Digital citizenship and character education - 3 views

I thought readers might be interested in my article about digital citizenship and character education, in the new issue of Educational Leadership. It echoes a number of points from my book, Digital...

citizenship character education digital literacy

started by jason ohler on 25 Feb 11 no follow-up yet
Anne Bubnic

Teachers Driving Web 2.0 Use in Schools Says National Research Survey - 0 views

  • The research indicates that the movement toward Web 2.0 use to engage students and address individual learning needs is largely being driven in districts from the bottom up – starting with teachers and students
  • Overall, the research confirms school districts are using or planning to use several types of Web 2.0 technologies, but reveals there is still resistance to using online social networking for instructional purposes.
  • ther key results of the survey include: The three most frequently cited reasons for adopting Web 2.0 technologies are: addressing students’ individual learning needs, engaging student interest, and increasing students’ options for access to teaching and learning. Online communications with parents and students (e.g., teacher blogs) and digital multimedia resources are the Internet technologies most widely used by teachers, and a majority of districts have plans for adopting these technologies or promoting their use. Teacher-generated online content (e.g., multimedia lessons, wiki-based resources) is likely to be the next area of growth in the use of Web 2.0 technologies. Almost half of districts have plans for adopting or promoting the creation and sharing of this content through Web 2.0 tools.
  • ...1 more annotation...
  • Over the next several months, the companies will conduct online focus groups, prepare a white paper summarizing and interpreting the research, and develop resources based on the insights learned to help guide districts in harnessing the educational power of the collaborative Web
  •  
    While many stakeholders are involved in developing policies on the use of Web 2.0 technologies in K-12 education, new research suggests that teachers are the most important group driving adoption. This is a major finding from a national research survey of more than 500 district technology directors. The survey was commissioned by Lightspeed Systems Inc., a leader in network security and management software for schools, and Thinkronize Inc., creators of netTrekker, America's number one educational search tool, with support from Atomic Learning.
JOSEPH SAVIRIMUTHU

IWF reports global decrease in child sexual abuse websites - 0 views

  • The Internet Watch Foundation (IWF) today published its Annual Report 2008 revealing a fall of nearly 10% in the number of international websites with child sexual abuse content. The report warns against complacency, pointing to the serious nature of the images which are often carried on commercial websites.   The report also highlights the fact that 74% of child sexual abuse domains traced by IWF are commercial operations selling indecent images of children, and 75% of the these (some 850 unique domains) are registered with just 10 domain name registries. This underlines the importance of recent international efforts with domain name registries to get the site names delisted, and will remain a focus of IWF attention going forward.
Anne Bubnic

Identity Theft and Children - 0 views

  • Financial identity theft: This most commonly occurs when the Social Security Number (SSN) and name is used to establish new lines of credit.
  • Criminal identity theft: This typically occurs when a person “borrows” the information of the minor to get a driver’s license or uses the child’s identity when caught in a criminal act. This person may be an illegal immigrant who bought the information or a relative who has had a license suspended or revoked.
  • Identity Cloning: Cloning is when a identity thief uses an identity for financial, criminal, and governmental purposes. Most frequently, profilers have people in positions where they are able to collect information about minors and then sell it on the black market. The most frequent purchasers of this information, in our experience, are illegal immigrants or people who are trying to “restart” their lives and avoid arrest
  •  
    A fact sheet from the Identity Theft Resource Center identifying three kinds of identity theft: financial identity theft, criminal identity theft and identity cloning.
JOSEPH SAVIRIMUTHU

Yahoo Could Be Liable For Lewd and Libelous Profile - 0 views

  • When Oregon resident Cecilia Barnes broke up with her boyfriend, he responded by posting a fake profile of her on Yahoo -- and a particularly nasty one at that. He included nude photos of Barnes as well as her name, address and phone number.
  •  
    In a ruling that could have significant ramifications for Web publishers, a federal appellate court has held that Yahoo could face liability for breach of contract for failing to delete a post that was meant to harrass a former girl friend.
Anne Bubnic

Report: Social networking up 83 percent for U.S. - 0 views

  • Former top dog MySpace watched its usage drop nearly one-third to around 4.9 billion minutes, from 7.2 billion in April 2008. MySpace still scored the number one spot for online video among the top 10, thanks to its users streaming more than 120 million videos from the site for April of this year.
  • We have seen some major growth in Facebook during the past year, and a subsequent decline in MySpace," Jon Gibs, Nielsen's vice president for online media and agency insights, said in a statement. "Twitter has come on the scene in an explosive way perhaps changing the outlook for the entire space."
  •  
    The explosion in social networking may be even greater than imagined. The time that people in the U.S. spend on social network sites is up 83 percent from a year ago, according to a report from market researcher Nielsen Online.
JOSEPH SAVIRIMUTHU

Cybersmart Detectives [Game] - 0 views

  • Cybersmart Detectives is an innovative online game that teaches children key internet safety messages in a safe environment. Children work online in real time liaising with community professionals to solve an internet-themed problem. The activity is based in the school environment, and brings together a number of agencies with an interest in promoting online safety for young people, including State and Federal Police, internet industry representatives and child welfare advocates. In the scenario, children play the role of a school Deputy Principal concerned about the welfare of a new student, who may be being bullied by someone they have met in an internet chat room. Guided by a series of clues, children work collaboratively in teams to solve the mystery of what is worrying the student, and why. 'Cybersmart Guides' respond to the questions and theories posed by the students, and guide the teams through each of the 'clues'. As the scenario unfolds, the children discuss the risks of certain online and offline behaviours, and ways of managing those risks. Although the scenario presented in the activity is simulated, the sense of urgency that excites a class of children taking part is very real. By the end of the activity children will have learned some valuable lessons about some of the risks associated with internet use, especially useful tips for chatting safely online. More importantly, the issues that lie behind the story will have been discussed with professionals who deal with similar issues on a daily basis. Cybersmart Detectives was initially developed by UK-based child advocacy agency Childnet International, and until 2005, operated under the name of Net Detectives. The activity is now independently operated by E-ngagelive. The Australian Communications and Media Authority ( ACMA ), by agreement with E-ngagelive , has adapted the activity for use in Australian schools under the name Cybersmart Detectives.
  •  
    Another example of emerging norms focussed on empowerment of children, this game is played online and accessible only to students in the United Kingdom.
raushan-19

satta matka - 0 views

  •  
    Nowadays, The Satta Matka can be played online.NowadaysA number of the web sites that allow you to play on-line Satta Matka Game Then If You Want Play Online Matka Game Then Visit. https://www.sattamatka.net
raushan-19

Satta Matka Kalyan Matka Boss - 0 views

  •  
    Its high time to join our Satta Matka guessing forum and receive expert opinion and tips along with expert reviews to ensure winnability. Join Satta Matka now and win all Satta matka games and be a Satta king. We are an undisputed and top website for Satta Matka guessing with 100% genuine and fix Satta Bazar number guessing from expert players OF Satta Result. is the single point destination where you get the ever fastest all Satta Matka game.
« First ‹ Previous 81 - 100 of 111 Next ›
Showing 20 items per page