Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged open

Rss Feed Group items tagged

syukron nuryadi

Joystick Toggle Switch 31MX User Manual And Features - 0 views

machine component

started by syukron nuryadi on 29 Dec 13 no follow-up yet
syukron nuryadi

ZTE SONATA 4G MANUAL - 0 views

image

zte manual user guide

started by syukron nuryadi on 11 Mar 14 no follow-up yet
Anne Bubnic

Leadership, Education & Etiquette - On or Offline [LEO] - 0 views

  • They are now developing a Web site to help educate their peers on the same issues and plan to visit elementary and middle school students this year to pass on Internet safety messages. Students also created individual blogs this week. "We're trying to develop youth to be leaders in the city and the state and the nation and the world. With the Internet, it's not just local," said Akua Goodrich, the program's director who helped found the Power Unit for Motivating Youth, an after-school and mentoring program in the city. "We have to prepare them to be safe and help spread the message."
  • "When you're a kid, you don't want to listen to an adult who doesn't know what you're going through," she said. "You're much more open to listen to your peers talk to you. It's more interesting."
  •  
    The Leadership, Education and Etiquette - On and Offline, or [Leo ] Student Leadership Training Project ended Friday with a debriefing and motivational words by the program's adult leaders. It wrapped up four days of training in which the 26 teens learned about cyber safety and social networking issues as well as peer-to-peer marketing and career preparations.
Anne Bubnic

Child Identity Theft [Video] - 1 views

  •  
    ID theft has become the crime this generation will deal with most of their lives.Kids just never think about Identity Theft. Most parents are not even aware that kids have identities to be stolen. A 2-minute, eye-opening news video.
Anne Bubnic

Back to School Tips| Americans for Technology Leadership - 0 views

  • Cyberbullying Cyberbullying or online bullying is repeated, unwanted or cruel behavior against someone through computers, cell phones, gaming consoles, or other Internet-based means. The Internet is always “on,” opening the door for 24-hour harassment. Cyberbullies can be anonymous. They never have to confront their victims, they don’t have to be physically stronger and cyberbullies may be virtually invisible to parents and adults.
  • Look for warning signs your child may be the victim of cyberbullying – depression, lack of interest in school and friends, drop in grades and subtle comments that something may be wrong. If your child is the victim of cyberbullying, take action. By filtering email, instant messages and text messages, you can cut off many of the ways the cyberbullies contact your child. By having your child avoid the sites and groups where the attacks occur, he/she can ignore the bully. If harassment continues, change your child’s email address, user names and Internet account. If these steps do not stop the cyberbullying, contact the parents of the child who is behind the bullying, contact the school, and if the situation is not resolved, involve the police. It’s important to compile copies of harassing emails and postings to have evidence for authorities or the school, so they can take action. Look for signs that your child may be the cyberbully themselves – if they sign onto the Internet under someone else’s name, if they use someone else’s password without their permission, if they posted rude or mean things about someone else online, if they use bad language online, or if they changed their profile or away message designed to embarrass or frighten someone. Talk to your kids about cyberbullying and why it’s wrong and hurtful.
  •  
    As children go back to school, many parents are concerned about how their children will be using the computer and Internet devices in the classroom. Communication is key. Parents need to talk with their children about how to use the Internet safely, potential threats and appropriate usage of the Internet. By understanding both the benefits and the risks of Internet use, families can have a safer and more secure online experience. This article includes key tips on cyberbullying, internet safety, privacy and security.
Anne Bubnic

The Millennials Are Coming! - 0 views

  • Most agencies manage sensitive citizen data: addresses, Social Security numbers, financial records and medical information. You name it, some state or local office has it, and probably electronically. The problem? Many theorize that the Millennials' penchant for online openness could unintentionally expose private information, leaving it ripe for the picking. Millennials bring innovative ideas about technology's use, but for that same reason, do they also pose new security risks?
  • Anti-virus vendor Symantec released a study in March 2008 assessing this issue. Symantec commissioned Applied Research-West to execute the study, and 600 participants were surveyed from different verticals, including government. Survey participants included 200 IT decision-makers, 200 Millennial workers and 200 non-Millennial workers born before 1980. The data revealed that Millennials are more likely than workers of other ages to use Web 2.0 applications on company time and equipment. Some interesting figures include: 69 percent of surveyed Millennials will use whatever application, device or technology they want at work, regardless of office IT policies; and only 45 percent of Millennials stick to company-issued devices or software, compared to 70 percent of non-Millennials.
  • How might young people be workplace assets? Could all that time typing or texting make them speedy typists, able to whip up memos at the drop of a hat? Does familiarity with new and emerging technologies have its benefit? You bet, according to Dustin Lanier, director of the Texas Council on Competitive Government. The council brings state leaders together to shape policy for government departments, including IT. "I think they've built an approach to work that involves a lot of multitasking," Lanier said of the Millennials. "Something will be loading on one screen, you alt-tab to another application and pull up an e-mail, the first process loads, you flip back, start a new process, flip to a forum and pull up a topic. It's frenetic but normal to that group." Lanier doesn't think Millennials present more of an IT threat than their older co-workers. After all, young people don't have a monopoly on being distracted in the office. "I can't tell you how many times I've walked by people's desks of all ages and seen Minesweeper up," he said. He thinks employers should embrace some Web 2.0 applications. Otherwise, Millennials might be discouraged from sticking around. According to Lanier, this younger work force comprises many people who think of themselves as free agents. Government should accommodate some of their habits in order to prevent them from quitting.
  •  
    Get ready CIOs. They're coming. They have gadgets and doohickeys galore. They like their music downloadable and portable, and they grew up with the Internet, not before it. Their idea of community is socializing with people in other cities or countries through Facebook, MySpace or instant messages, and they use e-mail so often they probably think snail mail is an endangered species. They're the Millennials - those tech-savvy, 20-somethings and-under bound to warm up scores of office chairs left cold by retiring baby boomers. There's a good chance many will come to a government workplace near you, but their digital literacy could prove worrisome for security-conscious bosses.
Anne Bubnic

Twitter and Plurk: What Parents Should Know - 0 views

  • While there is nothing inherently dangerous in the sites themselves, there is the risk that teens could use microblogs to reveal personal information or engage in a relationship with someone whose intentions are less than honorable. And like any other form of communication, the door is open for a teen to take risks such as talking about sex with strangers (albeit in relatively short bursts) or getting together with someone they meet through a microblog.
  •  
    Services like Twitter and Plurk let people post very short messages (140 characters or less) to their friends and acquaintances. Founded in 2006, Twitter has attracted millions of users who keep people posted about what they're doing and thinking. It can be as simple as "I'm standing in line at the grocery store" to as profound as a quick comment about a political candidate, a world event or a new book. There's even a video spin-off of this concept called 12 Seconds that allows people to post video clips no longer than 12 seconds.
Anne Bubnic

Students' new best friend: 'MoSoSo' - 0 views

  • Mobile GPS will open a Pandora’s box of possibilities, say others. “I’d be very concerned about pedophiles or identity thieves hacking into a system and locating me, my wife, or daughter,” says Henry Simpson, who coordinates new technology for the California State University at Monterey Bay (CSUMB). “It raises huge safety issues,” he adds.
  • But new technologies have always brought new risks – such as identity theft. Philosophically, every technology has both positive and negative values, says Andrew Anker, vice president of development at Six Apart, a Web consulting firm. “In fact,” he points out, “the most positive aspects are what also add the most negative.”
  • Companies looking to do business on college campuses have paid particular attention to security concerns. Rave Wireless introduced a GPS/MoSoSo enabled phone for students this past year, emphasizing the security value of the GPS feature over its potential to deliver underage victims to predators. While the Rave phones enable students to find like-minded buddies (Bored? Love Indian food? Meet me under the clock!), it also offers a cyberescort service linked to campus police. If the student doesn’t turn off a timer in the phone, indicating safe arrival at a destination, police are dispatched to a GPS location.
  •  
    Talking on cellphones is passé for students who use them for networking and sending photos. Mobile Social Networking Software - the next wave of virtual community - is already appearing on cellphones, beginning with college campuses. These under-25s (the target market for early adoption of hot new gadgets) are using what many observers call the next big consumer technology shift: Mobile Social Networking Software, or Mososo. The sophisticated reach of cyber-social networks such as MySpace or Facebook, combined with the military precision of GPS, is putting enough power in these students' pockets to run a small country.
Anne Bubnic

Digital Natives and the Myth of Multi-Tasking - 0 views

  • Dave Crenshaw discussed his latest book, The Myth of Multitasking. Crenshaw makes a strong distinction behind “background tasking”—reading a magazine while waiting in line, for instance, or listening to music while coding—and “switch-tasking.” Most of the time, when we talk about “multi-tasking,” we’re actually talking about the very costly practice of “switch-tasking.” Every time you switch your attention from one place to another—even from one browser window to another—you take a significant hit to your focus
  • Switch-tasking, he definitively proves, causes you to execute each task more slowly than you would otherwise, with more errors
  • pecifically, what can parents, teachers, and employers do to help their kids, students, and employees focus their attention more effectively? As a kid, student, and employee myself, I have to say that I believe the solution is emphatically not to limit access—at least not for older teens. Rather, I think the key lies in laying out the facts and discussing strategies. Information overload and the allure of infinite access, after all, are challenges that affect everyone with an internet connection—not just young people. And, though writing a stellar book report might not be a cause compelling enough to warrant total focus, every young person will at some point find a pursuit worth paying attention to. Maybe it’s writing short stories; maybe writing music. Maybe it’s making art. But when that pursuit comes along, they’re going to want to know how to firewall their attention, focus their efforts, and—for once—stop switching.
  •  
    What ever happened to old-fashioned "discipline?" This question has come up constantly in my conversations with parents and teachers over the course of my involvement with the Digital Natives project. When parents glance over and see not only 50 browser tabs open on the family computer, but iTunes and a computer game and AIM too-with a book report relegated to a tiny corner of the screen-they're understandably bewildered. How do kids ever get anything done? "I'm just really good at multi-tasking, Mom," a savvy student might reply. And, as long as the work gets done, it seems hard to argue with that logic.
Anne Bubnic

The Road to Cybersafety - 0 views

  • Carrill is part of the Platte County Sheriff’s Office. He also leads the Western Missouri Cyber Crimes Task Force. One of his primary missions is to track down and arrest online predators who trade in child pornography.And all these cameras only make his job more challenging. About 40 percent of the nation’s minors have access to Webcams, Carrill explained, devices for uploading live video to the Internet. About 65 percent of all children have access to cell phone cameras.
  • erhaps the biggest issue is that fact that kids don’t understand that when a picture is posted online, it’s nearly impossible to remove.“Once that image is taken, it’s out there forever,” Shehan said. “The No. 1 issue that we’ve seen with Webcams is teenagers self-producing pornography.”
  • All we can tell them is, ‘I’m sorry,’” Carrill said. “The minute the camera clicks, you no longer own that image. It has the potential to harm that person years from now.”A Webcam placed in a child’s bedroom is another bad combination, according to Shehan and Carrill. Sexual predators search for kids who use Webcams in the privacy of their own rooms, then lure or blackmail the child into providing pictures of themselves.“We see cases time after time of children who take pictures, send them to a predator and get a pornographic collage back that the predator uses to blackmail the child into providing more images,” Shehan said.
  • ...3 more annotations...
  • . About 40 percent of the nation’s minors have access to Webcams, Carrill explained, devices for uploading live video to the Internet. About 65 percent of all children have access to cell phone cameras.Carrill’s team recently started a new operation to search image-trading Web sites for known child pornography in Missouri. The results were frightening, he said. More than 6,000 images were found in the state; about 700 of those pictures were downloaded in the Kansas City area.Between sexual predators who fish for images and immature decisions by kids with cameras, more children are either having their images posted online or being exposed to pornography, according to a 2006 report by the National Center for Missing and Exploited Children.
  • In the end, the best tool to defeat child pornography is parent education, according to both Shehan and Carrill. More than anything, kids need to know they can trust their parents.“It’s through that open line of communication between the parent and child that they can work through or prevent bad situations,” Carrill said.
  • All parents should follow a few basic rules when it comes to cyber safety, according to experts:- Keep computers in common areas of the home.- Monitor Internet use by children.- Enable privacy protection software.- Turn Webcams off or protect them with a password.- Track what images are being uploaded by children in the household.- Talk to children about what is appropriate.
  •  
    Webcams, cell phone cameras being put to troubling use, experts say. People are taking pictures, lots of them, and then uploading them as permanent displays in the Internet collection.
Marie Coppolaro

Bloom's Taxonomy and the Digital World - Open Education - 0 views

  •  
    Bloom's Taxonomy redefined for the digital world.
Anne Bubnic

How to Friend Mom, Dad, and the Boss on Facebook...Safely - 1 views

  •  
    A helpful article on how to use Facebook. A good article to look at when explaining Facebook to students
  •  
    Oh no! Your mom just joined Facebook and what's even worse, she wants to be your friend. More and more people are finding themselves in this situation today and unsure of what to do. Friending mom and dad, the boss, or other work colleagues opens up the details of your private life for the whole world to see - and you might not be entirely comfortable with that. What's to be done?
Anne Bubnic

ReadWriteThink: Fact Fragment Frenzy - 0 views

  •  
    Designed as a research development tool to help students decide how to isolate the important facts in a body of text, this note-taking tool is great for summarizing and paraphrasing practice.
Judy Echeandia

Seven Things All Adults Should Know About MySpace [Doug Johnson] - 0 views

  • What's a teacher to do? Stay informed about student uses of technology. Build student trust by maintaining an open mind about new social phenomena. Teach students about potential hazards of all online environments.
  •  
    This article offers seven things all adults need to know about social networking sites like MySpace.
    1. Social networking is enormously popular with young adults.
    2. Friends are probably just that.
    3. Blocking sites at school won't keep kids away from MySpace.
    4.Some degree of danger does exist for MySpace users.
    5. The MySpace organization is working toward a safer online
    6. Teachers might want to check to see if they have had a MySpace account created for them.
    7.MySpace and social networking have value.

Anne Bubnic

Class, Open Your Phones! - 0 views

  •  
    Trends suggest that mobile phones have educational potential. Cell phones are often tolerated in schools as long as they are turned off during lessons; sometimes they're banned outright. But as mobile technologies continue to improve and pioneers find innovative ways to use them, it's only a matter of time before students are admonished for not bringing their phones to class.
Vicki Davis

princecaspianproject wiki - 0 views

  • This project is open to all FOURTH to SIXTH GRADE STUDENTS Worldwide between the months of April to June, 2008
  • The main purpose of this project is provide a way for teachers to collaborate with other teachers all over the world about the book (and soon to be released) "PRINCE CASPIAN".
  •  
    An excellent project for 4th - 6th grade sudents from Jennifer Wagner called the Prince Caspian project which will allow teachers to collaborate with other teachers around the world about the book and the upcoming movie "Prince caspian."
  •  
    Excellent global collaborative projects from one of the experts, Jennifer Wagner.
Anne Bubnic

U.S. Dept of Education - Open Innovation Portal - 1 views

  •  
    Online community headed by the Federal Chief Technology Officer and US Secretary of Education, Arnie Duncan - bringing innovation to Education
Anne Bubnic

The New Writing Pedagogy - 1 views

  •  
    Because Cory was in a class that used social networking tools for writing-specifically Elgg, an open source media platform-other students, teachers, family members and even the general public were able to comment on his story. For example, an "army colonel," who did not give a name, said about chapter 1, "Your words have painted a very vivid picture. You did an excellent job of illustrating the terror of war. Keep up the good work."
Anne Bubnic

Meeting of Minds: Cross Generational Dialogue on the Ethics of Digital Life [pdf] - 2 views

  •  
    The project was born out of a sense of curiosity and experimentation. Can youth and adults have open and honest conversation in an online setting? What are the perceptions and tensions across generations when it comes to how we act on the Internet? Is it possible to reach common ground when it comes to digital ethics?
Anne Bubnic

Around the World with 80 Schools - Opening the Walls of your Classroom. - 2 views

  •  
    Around the World with 80 Schools started in January 2009 and is an ongoing project. The challenge is to connect your students with 80 schools from around the world via Skype (a free video conferencing tool).
« First ‹ Previous 61 - 80 of 95 Next ›
Showing 20 items per page