Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged photograph

Rss Feed Group items tagged

Anne Bubnic

Court Says Parents Can Block 'Sexting' Cases - 2 views

  • The district attorney at the time, George Skumanick Jr., said that students possessing “inappropriate images of minors” could be prosecuted for possession or distribution of child pornography, and sent letters to the parents of the students with the phones — and the parents of students who appeared in the photographs — threatening to prosecute any student who did not participate in an after-school “education program.”
  • The syllabus called for the girls to write a report explaining why they were there, what they had done, and why it was wrong.
  •  
    In the first federal appeals court opinion dealing with "sexting" - the transmission of sexually explicit photographs by cellphone - a three-judge panel of the United States Court of Appeals for the Third Circuit ruled Wednesday that parents could block the prosecution of their children on child pornography charges for appearing in photographs found on some classmates' cellphones.
Anne Bubnic

Digital Natives & Visual Literacy» Got Missiles? - 0 views

  •  
    With Photoshop's ease in alteration of photos, students need to be taught to authenticate visual and textual information as part of any good digital literacy program. A recent photograph of Iranian missles was displayed by many prominent news organizations (including the BBC, the L.A. Times, and the New York Times) before it was noted that portions of the dust clouds beneath the missiles were identical. Online news sites have been abuzz all morning, engaged in a debate over what, exactly, this means. As the New York Times notes, this is not the first time Iran's state media has altered photographs for political ends.
Anne Bubnic

Eight Tips for Monitoring and Protecting Your Online Reputation - 9 views

  •  
    Here are 8 tips to monitor and protect one's online reputation from the U.S. Government Information Security Blog: Search your name. Type your first and last name within quotation marks into several popular search engines to see where you are mentioned and in what context. Narrow your search and use keywords that apply only to you, such as your city, employer and industry association. Expand your search. Use similar techniques to search for your telephone numbers, home address, e-mail addresses, and personal website domain names. You should also search for your social security and credit card numbers to make sure they don't appear anywhere online. Read blogs. If any of your friends or coworkers have blogs or personal web pages on social networking sites, check them out to see if they are writing about or posting pictures of you. Sign up for alerts. Use the Google alert feature that automatically notifies you of any new mention of your name or other personal information. Limit your personal information. Tweet/chat/discuss regarding business and the emerging trends in your industry, but limit posting information on your personal life, which could be a subject of major scrutiny by recruiters and hiring managers. Also, be sure you know how organizations will use your information before you give it to them. Use privacy settings. Most social networking and photo-sharing sites allow you to determine who can access and respond to your content. If you're using a site that doesn't offer privacy settings, find another site. Choose your photos and language thoughtfully. You need to ensure that information posted online is written professionally without use of swear words and catchy phrases. Also, be very selective in posting photographs, and use your judgment to ensure that these photographs are how you want the world to see you. Take action If you find information about yourself online that is embarrassing or untrue, cont
Anne Bubnic

Students take online revenge on teachers - 0 views

  •  
    Students are taking a high-tech approach to revenge on teachers - assuming their identities in fake online profiles and putting doctored photographs of them on the internet. The modern trend - dubbed "worrying" this week by the secondary teachers' union - appears to have firmly taken hold in New Zealand this year. It is an extension of the problem of teenagers cyber-bullying their peers and follows the trend of fake profiles created for celebrities and politicians.
Vicki Davis

Royal today, average tomorrow? - Digi Teen - 0 views

  •  
    Case study on New jersey facebook picture "blackmail" case written by a teenager on the Digiteen project.
  •  
    Considering the posting of photos and what should be shared is something all teenagers should consider. This is a blog post from a teenager on the digiteen project about the difficulty lawmakers have in prosecuting "digital blackmail" cases. Certainly harm was done, but legislation has not been passed protecting photographs posted on one's Facebook page and shared with friends. This is hard for students to understand but is an important case study to read about. Certainly having teenagers research and report their findings is a great way to help them understand the implications of what they are doing.
anonymous

Online Predators and Their Victims - 0 views

  • My (Liz B. Davis ) Summary of Key Points (All are quotes directly from the article): Online "Predators" and Their Victims. Myths, Realities, and Implications for Prevention and Treatment. by: Janis Wolak, David Finkelhor, and Kimberly J. Mitchell - University of New Hampshire and Michele L. Ybarra - Internet Solutions for Kids, Inc.
  • The publicity about online"predators" who prey on naive children using trickery and violence is largely inaccurate.
  • adult offenders who meet, develop relationships with, and openly seduce underage teenagers
  • ...21 more annotations...
  • In the great majority of cases, victims are aware they are conversing online with adults. In the N-JOV Study, only 5% of offenders pretended to be teens when they met potential victims online. (112)
  • Offenders rarely deceive victims about their sexual interests.
  • promises of love and romance
  • 99% of victims of Internet-initiated sex crimes in the N-JOV Study were 13 to 17 years old, and none were younger than 12. 48% were 13 or 14 years old. (115)
  • it was those 15-17 years of age who were most prone to take risks involving privacy and contact with unknown people. (115)
  • take place in isolation and secrecy, outside of oversight by peers, family  members, and others in the youth's face-to-face social networks (115)
  • Most of the online child molesters described in the N-JOV Study met their victims in chatrooms. In a 2006 study, about one third of youths who received online sexual solicitation had received them in chatrooms. (116)
  • Youth internet users with histories of offline sexual or physical abuse appear to be considerably more likely to receive online aggressive sexual solicitations. (117)
  • ..Although Internet safety advocates worry that posting personal information exposes youths to online molesters, we have not found empirical evidence that supports this concern. It is interactive behaviors, such as conversing online with unknown people about sex, that more clearly create risk. (117)
  • Online molesters do not appear to be stalking unsuspecting victims but rather continuing to seek youths who are susceptible to seduction. (117)
  • maintaining online blogs or journals, which are similar to social networking sites in that they often include considerable amounts of personal information and pictures, is not related to receiving aggressive sexual solicitation unless youths also interact online with unknown people. (117)
  • Boys constitute 25% of victims in Internet-initiated sex crimes, and virtually all of their offenders are male. (118
  • Some gay boys turn to the internet to find answers to questions about sexuality or meet potential romantic partners, and there they may encounter adults who exploit them. (118)
  • ..child molesters are, in reality, a diverse group that cannot be accurately characterized with one-dimensional labels. (118)
  • Online child molesters are generally not pedophiles. (118)Online child molesters are rarely violent. (119)
  • Child pornography production is also an aspect of Internet-initiated sex crimes. One in five online child molesters in the N-JOV Study took sexually suggestive or explicit photographs of victims or convinced victims to take such photographs of themselves or friends. (120)
  • Youths may be more willing to talk extensively and about more intimate matters with adults online than in face-to-face environments. (121
  • it may not be clear to many adolescents and adults that relationships between adults and underage adolescents are criminal. (122)
  • Simply urging parents and guardians to control, watch, or educate their children may not be effective in many situations. The adolescents who tend to be the victims of Internet-initiated sex crimes many not themselves be very receptive to the advice and supervision of parents. (122)
  • We recommend educating youths frankly about the dynamics of Internet-initiated and other nonforcible sex crimes. Youths need candid, direct discussions about seduction and how some adults deliberately evoke and then exploit the compelling feelings that sexual arousal can induce. (122)
    • anonymous
       
      Let's remember that although there are direct references to gay and male pedophiles of gay boys, that 99% of child sex offenders identify as heterosexual, online or offline.
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
  •  
    This research article has the facts about sexual predatory behavior.
Anne Bubnic

Copyright Website - 0 views

  •  
    Real world, practical and relevant copyright, fair use and public domain information. Covers copyright in the visual domain (movies, tv shows, photographs, screenplays, art, sculpture), copyright in the audio domain (musical compositions, lyrics, sound recordings) and copyright in the digital domain (web, Internet and software).
Anne Bubnic

Sexting, and What it Means to be a Girl - 5 views

  •  
    On January 15, the U.S. Court of Appeals for the 3rd Circuit heard arguments in Miller, et al. v. Skumanick, a child pornography case that, oddly, involves no child pornography. The case goes back to 2006, when two girls aged 12 were photographed by another friend on her digital camera. The two girls were depicted from the waist up, wearing bras. In a separate situation, our third client was photographed as she emerged from the shower, with a towel wrapped around her waist and the upper body exposed. Neither of the photos depicted genitalia or any sexual activity or context. In 2008 the girls' school district learned that these and other photos were circulating, confiscated several students' cell phones, and turned the photos in question over to the Wyoming County district attorney, George Skumanick, Jr.
Anne Bubnic

Vanessa Hudgens Photos Leaked: A Teachable Moment - 7 views

  •  
    She's the female star of Disney's hugely popular High School Musical franchise, and in 2007, she apologized for the nude photographs that "appeared" on the internet. Allegedly, they were meant for her boyfriend and co-star Zac Efron's eyes only.
Anne Bubnic

What to do if your pictures are stolen on Flickr - - 2 views

  •  
    Like many photographers I enjoy people viewing my pictures, but I don't appreciate people using my images without permission, again by this I don't mean when someone uses my images and gives me proper credit and links back to this site, that is ok and encouraged. What I mean by "without permission" is when they pass it as their own or use it for profit without compensating me and asking for permission.
Anne Bubnic

Teaching About the Web Includes Troublesome Parts - 1 views

  • hat blurred line between public and private space is what Common Sense tries to address. “That sense of invulnerability that high school students tend to have, thinking they can control everything, before the Internet there may have been some truth to that,” said Ted Brodheim, chief information officer for the New York City Department of Education. “I don’t think they fully grasp that when they make some of these decisions, it’s not something they can pull back from.” Common Sense bases all its case studies on real life, and insists on the students’ participation. “If you just stand up and deliver a lecture on intellectual property, it has no meaning for the kids,” said Constance M. Yowell, director of education for the John D. and Catherine T. MacArthur Foundation, which has provided financing.
  •  
    When Kevin Jenkins wanted to teach his fourth-grade students at Spangler Elementary here how to use the Internet, he created a site where they could post photographs, drawings and surveys. And they did. But to his dismay, some of his students posted surveys like "Who's the most popular classmate?" and "Who's the best-liked?"
Anne Bubnic

Online youth need critical thinking skills - 0 views

  •  
    Today's media environment provides an opportunity--and responsibility--for parents and schools to teach critical thinking. Not only must young people learn to "consider the source" of what they take in but also think critically about what they post in a world where just about every young person is now potentially an author, photographer, and videographer. Kids--who may never even know who Walter Cronkite was--need to have a miniature version of him inside their head by asking questions such as "Is this true?" and "How do I know it's true?."
buyverifiedets

Buy Wechat Account - 100% Fully Verified & Safe - 0 views

  •  
    Buy Wechat Account Introduction In China, Wechat is an extremely well-liked social media site. In that it enables user-to-user communication, it is comparable to WhatsApp, but it also offers a number of other features that set it apart. Users of Wechat, for instance, can follow each other's changes in a newsfeed and share photographs and videos. Additionally, Wechat includes an integrated payment system that makes it simple for users to make transactions online. What Is Wechat Account ? Users of the social media site Wechat can communicate with their friends and family. The ability to utilize all of Wechat's services requires a Wechat account, which can be used to log in. Making a WeChat account is free and simple. A working email address is all you need. You can start interacting with people once you've registered a Wechat account by adding them as friends, messaging them, and participating in group chats. Buy Wechat Account
  •  
    Introduction In China, Wechat is an extremely well-liked social media site. In that it enables user-to-user communication, it is comparable to WhatsApp, but it also offers a number of other features that set it apart. Users of Wechat, for instance, can follow each other's changes in a newsfeed and share photographs and videos. Additionally, Wechat includes an integrated payment system that makes it simple for users to make transactions online.
Vicki Davis

Children Online: Getting Younger and Continuing to Take Risks - 0 views

  • 16% posted personal interests 15% posted information about their physical activities 20% gave out their real name 5% posted information about their school 6% posted their home address 6% posted their phone number 9% posted a photograph of themselves
    • Vicki Davis
       
      Again, education is so important of both students and parents.
  •  
    A 2007-2008 research study conducted by Rochester Institute of Technology (RIT) reported several key findings that indicate children are logging on to the Internet at a very young age. Parental supervision of this computer activity, however, is generally lax. Not surprisingly, the study found that children are communicating with friends, peers, and others online in ways that show a lack of knowledge in what is ethical, safe behavior.
Vicki Davis

Search and Seizure of Cell Phones: Can You Hear Me Now? - 0 views

  • May school officials lawfully “search” the confiscated cell phone to look at stored text messages, photographs, videos, and logs of incoming and outgoing calls? Clearly, the circumstances of the search must satisfy the T.L.O. standard. Not as clear, however, is whether such a search violates federal or Michigan laws regarding stored electronic communications.
  • [A] search of a student by a teacher or other school officials will be ‘justified at its inception’ when there are reasonable grounds for suspecting that the search will turn up evidence that the student has violated or is violating either the law or the rules of the school. Such a search will be permissible in its scope when the measures adopted are reasonably related to the objectives of the search and not excessively intrusive in light of the age and sex of the student and the nature of the infraction.”
  • In Klump v Nazareth Area Sch Dist, 425 F Supp 2d 622 (ED Pa, 2006), a federal district court denied the school’s motion to dismiss a lawsuit filed by a student whose cell phone was searched.
  • ...5 more annotations...
  • compensatory and punitive damages for the alleged unconstitutional search, violation of the Pennsylvania Wiretapping and Electronic Surveillance Control Act, invasion of privacy, and defamation.
  • The court ruled that the student had stated a claim for the alleged violation of his right to be free from an unreasonable search.
  • here was no basis for them to search the text and voice mail messages stored on the phone.
  • unlawful access to the stored voice mail and text message communications.
  • (2) A person shall not willfully and maliciously read or copy any message from any telegraph, telephone line, wire, cable, computer network, computer program, or computer system, or telephone or other electronic medium of communication that the person accessed without authorization. (3) A person shall not willfully and maliciously make unauthorized use of any electronic medium of communication, including the internet or a computer, computer program, computer system, or computer network, or telephone.
  •  
    Legal Implications for Searching Student Cell Phones. Although this article is written against Michigan law, it does help clarify some of the concepts for what is permissable. Note that searching a student's cell phone or wireless device without parent permission may violate state wiretapping laws.
  •  
    Confiscating and looking at information on cell phones by school officials is still not clear. This is a very interesting case study for those working with digital citizenship issues at their school.
  •  
    Fascinating article explaining Michigan take on searching and confiscating cell phones.
Anne Bubnic

Photographic Truth in the Digital Era | Teachable Moment - 1 views

  •  
    In November 2001 the National Capital Commission, the Crown corporation responsible for planning and developing Canada's National Capital Region, caused some controversy when they published a promotional brochure for the city of Ottawa that featured a digitally enhanced photo on its cover.
JOSEPH SAVIRIMUTHU

Changes at MySpace Signal a Move Away From Social Networking | - 0 views

  • SHARETHIS.addEntry({ "title": "Changes at MySpace Signal a Move Away From Social Networking", "url": "http://www.thewrap.com/article/2736", "published": "1240950792" }, { "button": true })ShareThis yahooBuzzArticleHeadline = "Changes at MySpace Signal a Move Away From Social Networking"; yahooBuzzArticleSummary = "Sign of the times: One senior executive for comedy at MySpace has 1,403 friends on Facebook."; yahooBuzzArticleCategory = "entertainment"; yahooBuzzArticleType = "text"; thewrapcom49:http://www.thewrap.com/article/27363 votesBuzz up! Slideshow Depeche Mode's Traffic-Stopping Concert Depeche Mode celebrated the release of its 12th studio album, "Sounds of the Universe," with a free concert on Hollywood Boulevard Thursday evening -- which literally stopped traffic. The performance, which also appeared on ABC's "Jimmy Kimmel Live!" later in the evening, drew a reported crowd of over 10,000. (Photographs by Jonathan Alcorn) Keywords Facebook news corp MySpace Chris Van Natta
adamhadi

Rental Kamera Banjarnegara, 0852-2765-5050 - 0 views

  •  
    Jasa rental kamera banjarnegara, 0852-2765-5050, mudah cara ordernya, mudah oersyaratannya
realcounterfeits

Buy Fake US passport - Real Counterfeits Money - 0 views

  •  
    Buy fake us passport online Get a fake US passport and enjoy native American privileges Who doesn't want to hold an American passport? People across the globe wish to be a citizen of this developed economy. Lucrative opportunities and high standards of living make this country a land of dreams. However, the US administration is also known for its complex bureaucratic rules. Whether you are a documented or an undocumented immigrant, they will make you run for your money to get things done. If you are looking for an easy way out, we have you covered with fake American passports for sale. They are as good as genuine ones with a replica of features like raised printing, holographic stripes, color-shifting inks, and embedded chips. There's no need for background verification when you order a fake USA passport online from us. We take care of everything from tip to toe!. buy fake us passport Fake American passports for sale without any officialism Citizenship laws are strictly regulated in the US, and the rules are even tighter for non-residents. When applying for a passport, you first need to prove your citizenship status. This includes submitting eligible documents issued by the authorities. The application fee you pay is non-refundable, regardless of acceptance or rejection. At realcounterfeitsmoney.com , we help you skip these formalities and get the job done from the comfort of your home. All you need to do is provide the necessary details and a passport-size photograph. Our team will replicate an original copy with a registered passport number. If you need any guidance from us to buy a fake US passport, we are always available to help! buy fake us passport buy fake us passport online buy real us passport online
1 - 20 of 21 Next ›
Showing 20 items per page