Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged reading

Rss Feed Group items tagged

Anne Bubnic

California Considers Anti-Cyberbully Bill - 0 views

  • A California government-sanctioned review of the bill notes inspiration from the National Association of Attorneys General (NAAG) Task Force on School and Campus Safety, which published a report suggesting schools increase their prevention activities against bullying in any form, “including cyber bullying.”
  • “The growth in the use of technology and social networking sites by younger Americans has fueled a fear among professionals that cyber bullying will become the means most often utilized to harass,” reads the report. “while certainly more prevalent in the elementary and secondary school setting, issues related to bullying or intimidation are increasingly relevant in other nontraditional settings.”
  •  
    Lawmakers in California are considering a bill to punish bullies that harass fellow student via digital means, such as test messages or social networks like MySpace.
Anne Bubnic

Cybersafety Assembly causes controversy on first day of high school - 0 views

  • John Gay, a police officer for the Cheyenne Police Department in Wyoming, volunteered at the request of Windsor High School principal Rick Porter to speak to students at two assemblies about the dangers of predators surfing social networking Web sites such as MySpace and Facebook.Gay shared how he could pull pictures off of Windsor High School students who had their own MySpace and Facebook pages. Nordic’s daughter, Shaylah, was one of the students Gay singled out to the point where Shaylah left the auditorium in tears.
  • Shaylah said Gay showed the other students her phone number, read her blogs and comments out loud.
  • He kept on picking at her and picking at her and picking at her and everyone said, ‘That’s harassment,’ ” Weakland said.
  • ...2 more annotations...
  • “Officer Gay chose it as an opportunity to take Shaylah’s pictures and her MySpace and use it as an example of what not to do, but then just really publicly humiliate her and mocked her,” said Nordic, who coaches wrestling at the high school and football and track at Windsor Middle School. “She left the auditorium in tears and busted out crying. He told the student body that he took her information from MySpace and showed it to a predator in prison and asked him what he would do with it.”
  • “You could imagine her sitting there and hearing that,” Nordic said. “He asked everybody there, ‘Is Shaylah Nordic here?’ So she raised her hand and then he went on to post the pictures and talk about it. He said she was likely to be raped and murdered because how easy it was to access this stuff, and how easy it was to get information.”
  •  
    Ty Nordic understands the need to inform kids about the dangers of sexual predators on the Internet. But when his 16-year-old daughter was targeted during an assembly at Windsor High School on the first day of school Tuesday afternoon, Nordic was left with plenty of unanswered questions for the presenter whom he said used inappropriate language during the assembly and singled out specific students.
Anne Bubnic

Digital Natives and the Myth of Multi-Tasking - 0 views

  • Dave Crenshaw discussed his latest book, The Myth of Multitasking. Crenshaw makes a strong distinction behind “background tasking”—reading a magazine while waiting in line, for instance, or listening to music while coding—and “switch-tasking.” Most of the time, when we talk about “multi-tasking,” we’re actually talking about the very costly practice of “switch-tasking.” Every time you switch your attention from one place to another—even from one browser window to another—you take a significant hit to your focus
  • Switch-tasking, he definitively proves, causes you to execute each task more slowly than you would otherwise, with more errors
  • pecifically, what can parents, teachers, and employers do to help their kids, students, and employees focus their attention more effectively? As a kid, student, and employee myself, I have to say that I believe the solution is emphatically not to limit access—at least not for older teens. Rather, I think the key lies in laying out the facts and discussing strategies. Information overload and the allure of infinite access, after all, are challenges that affect everyone with an internet connection—not just young people. And, though writing a stellar book report might not be a cause compelling enough to warrant total focus, every young person will at some point find a pursuit worth paying attention to. Maybe it’s writing short stories; maybe writing music. Maybe it’s making art. But when that pursuit comes along, they’re going to want to know how to firewall their attention, focus their efforts, and—for once—stop switching.
  •  
    What ever happened to old-fashioned "discipline?" This question has come up constantly in my conversations with parents and teachers over the course of my involvement with the Digital Natives project. When parents glance over and see not only 50 browser tabs open on the family computer, but iTunes and a computer game and AIM too-with a book report relegated to a tiny corner of the screen-they're understandably bewildered. How do kids ever get anything done? "I'm just really good at multi-tasking, Mom," a savvy student might reply. And, as long as the work gets done, it seems hard to argue with that logic.
Anne Bubnic

Social Networking Gets Schooled - 0 views

  • As a whole, the education industry is usually relatively slow to integrate technology into the classroom. In lots of schools nationwide, unbridled access to computers and the Internet is still the exception rather than the rule.
  • The moment students get outside of the classroom, on the other hand, social networking is almost a daily ritual.
  • Dedicated commercial Web 2.0 products and social networking applications are still too new and too rich for typical school leaders to afford. So third-party providers are more likely to offer technology services to students and their schools to expand their horizons in ways never before possible. For example, some school districts are going beyond e-mail technology and using collaboration software and online services to share information, host Web conferences and assign tasks and projects.
  • ...1 more annotation...
  • "Teachers are famous for relying on other teachers for the best ideas about what's working and what's not working. For that reason, as new teachers (read younger, tech-savvy, "Generation Network" college grads) enter the system, they are leveraging education-focused social networks to connect with other teachers, find content contributed by teachers and make sure that they are wringing every ounce of 'network effect' technology from the Internet."
  •  
    To today's students, online social networking is almost second nature outside of the classroom. What about inside the classroom? Educational software and services are taking a cue from Facebook and MySpace, adding a twist of online collaboration and interaction that brings students, teachers and parents together.
Anne Bubnic

Cyber Safety/Social Networking Safety Measures - 0 views

  • For the past two years Blumenthal and other states' attorneys general have negotiated with both Facebook and MySpace to implement more than 60 new safety measures to protect children from online predators and from gaining access to inappropriate content, like pornography.
  • Under the agreement with Facebook, its officials have agreed to prominently display safety tips, and to require users under the age of 18 to affirm that they have read the tips. Users over 18 can no longer search for under-18 users, and Facebook officials will automatically be notified when someone under 18 is in danger of providing personal information to an adult user.
  • Parents will also be provided with tools to remove a child's profile from the site. Inappro­priate images and content will be removed, and ads for age-restricted products, like alcohol and tobacco, will be limited to users old enough to purchase those items. Most significantly, Facebook agreed to diligently search for and remove profiles of registered sex offenders, and it will "in­crease efforts to remove groups for incest, pedophilia, cyber-bullying and other violations of the site's terms of service and expel from the site individual violators of those terms."
  • ...2 more annotations...
  • Under the agreement, MySpace now allows parents to submit their child's e-mail address to prevent anyone from using that e-mail address to set up a profile (e-mail addresses are required in order to set up an account for either Facebook or MySpace, and people may search for "friends" by entering e-mail addresses). For anyone under 16, MySpace will automatically set the profile to "private," allowing only approved people to view the profile. There is now a closed "high school" section of the site set aside for users under 18.
  • Like Facebook, MySpace officials will also "obtain and constantly update a list of pornographic Web sites and regularly sever any links" between the sites. MySpace agreed to provide a way to report abuse on every page that contains content. The site's officials also prom­ised to respond to complaints of inappropriate content within 72 hours.
  •  
    Connecticut Attorney General Richard Blumenthal has made it one of his priorities to install methods of protection for the state's children when it comes to using these Web sites, hoping to "make social networking safer," according to a press release generated by his office. Efforts by Facebook and MySpace to protect privacy are described in this article.
Anne Bubnic

Dizzywood Virtual World Enhances Technology Program for Kids - 0 views

  • “Dizzywood’s unique virtual environment offers our kids a wonderful environment in which they can learn important lessons through activities that require thoughtful decision-making. We hope the success of this program offers a model for other youth programs to follow.”  The partnership reinforces the findings of two recent studies of elementary school students conducted by UC Davis. The studies observed that children find ways to transform their experiences with technology into fun, highly organized group activities and that technology-based activities can be explicitly designed to foster social reflection and advanced planning among young children. 
  •  
    Dizzywood, a virtual world and online game for children ages 8-12, today announced that it has been selected by the YMCA of San Francisco to enhance the youth program's technology curriculum. The YMCA is using Dizzywood's virtual environment to reinforce its program emphasis on activities that promote values such as caring, honesty, respect and responsibility. Children also learn about important issues relating to virtual worlds, such as digital citizenship and online safety, as well as complete storytelling and team-building exercises that emphasize creativity, writing and reading skills, and working together to achieve goals. The YMCA program is similar to the elementary school program that Dizzywood recently completed with the Reed Union School District (Marin County, CA). The highly interactive workshop, which ran from April through June, used virtual activities to reinforce the school's character pillars, which include caring, citizenship, fairness, respect, responsibility and trustworthiness, among other core values.
Madeline Brownstone

Media Impact on Information Needs and Democratic Values to be Examined at Aspen Conference - 0 views

  • The Knight Commissioners and 40 other invited members to FOCAS will discuss how the media facilitates citizen engagement, the information rights and responsibilities of citizens, and the role of media in the electoral process. Participants will develop recommendations for citizens, media, and public institutions to serve the goals of American democracy better.
    • Madeline Brownstone
       
      I am interested to follow-up on this conference to read the outcomes. Schools seem to be more and more engaged in blocking internet access of students, The trend needs to shift to schools developing programs around digital citizenship.
  •  
    Trends, Access, Quality, and Presidential Candidate Policies to be Studied in Aspen, Colo. August 9-12

Lucy Gray

Review of Frontline: Growing Up Online - 0 views

  •  
    I'm surprised by this review of the Frontline program. I would have thought Eric would have been more critical. I agree that it's an important show to watch; however, I was concerned with a few things. One, I was concerned with the portrayal of a "helicopter" mom who wanted her kids' social networking passwords in case of emergency and I was also concerned about the kid who very cavelierly said he never read books. I also really wondered about parents who complained that their kids never turned off their cellphones at dinner time. I need to re-watch this program, but I think there is much here to be discussed that's not about the technology. It's about how we talk to and engage our students and children. It's really easy to blame bad behavior and scary incidents on technology.
  •  
    [February 08] A summary of each chapter and commentary provided by Eric Grant.
Vicki Davis

Michel Foucault, Privacy, and Doubts about Web 2.0 - 0 views

  •  
    Excellent post about how many are relinquishing their privacy. Very insightful post.
  •  
    Fascinating ponderings by Mike Curtain about how many of us are relinquishing our own privacy. This is a very thought provoking post and yet another one I wouldn't have read, had he not linked to my blog post yesterday asking for bloggers to share their links. This is a very powerful blog post. Wow! I personally think there is a balance here, but also agree than many are not considering the privacy they are relinquishing when they post things that don't belong out there for everyone to see. Internet privacy is an illusion, it really is.
Anne Bubnic

CTAP4 Cybersafety - Recommended Reading for Parents - 0 views

  •  
    You can print this list of books and free downloads for parents and distribute it at your next PTA meeting.
Jocelyn Chappell

Pupils and the Caring Sharing Internet | - 0 views

  •  
    I blog about pupils' use of interent, safe searching and the read/write web
Vicki Davis

FRONTLINE: growing up online: readings and links | PBS - 0 views

  •  
    These go with the growing up online series.
  •  
    Bookmarks from the growing up online series for parents. These are links to the major websites for online safety.
Vicki Davis

Search and Seizure of Cell Phones: Can You Hear Me Now? - 0 views

  • May school officials lawfully “search” the confiscated cell phone to look at stored text messages, photographs, videos, and logs of incoming and outgoing calls? Clearly, the circumstances of the search must satisfy the T.L.O. standard. Not as clear, however, is whether such a search violates federal or Michigan laws regarding stored electronic communications.
  • [A] search of a student by a teacher or other school officials will be ‘justified at its inception’ when there are reasonable grounds for suspecting that the search will turn up evidence that the student has violated or is violating either the law or the rules of the school. Such a search will be permissible in its scope when the measures adopted are reasonably related to the objectives of the search and not excessively intrusive in light of the age and sex of the student and the nature of the infraction.”
  • In Klump v Nazareth Area Sch Dist, 425 F Supp 2d 622 (ED Pa, 2006), a federal district court denied the school’s motion to dismiss a lawsuit filed by a student whose cell phone was searched.
  • ...5 more annotations...
  • compensatory and punitive damages for the alleged unconstitutional search, violation of the Pennsylvania Wiretapping and Electronic Surveillance Control Act, invasion of privacy, and defamation.
  • The court ruled that the student had stated a claim for the alleged violation of his right to be free from an unreasonable search.
  • here was no basis for them to search the text and voice mail messages stored on the phone.
  • unlawful access to the stored voice mail and text message communications.
  • (2) A person shall not willfully and maliciously read or copy any message from any telegraph, telephone line, wire, cable, computer network, computer program, or computer system, or telephone or other electronic medium of communication that the person accessed without authorization. (3) A person shall not willfully and maliciously make unauthorized use of any electronic medium of communication, including the internet or a computer, computer program, computer system, or computer network, or telephone.
  •  
    Legal Implications for Searching Student Cell Phones. Although this article is written against Michigan law, it does help clarify some of the concepts for what is permissable. Note that searching a student's cell phone or wireless device without parent permission may violate state wiretapping laws.
  •  
    Confiscating and looking at information on cell phones by school officials is still not clear. This is a very interesting case study for those working with digital citizenship issues at their school.
  •  
    Fascinating article explaining Michigan take on searching and confiscating cell phones.
Anne Bubnic

Online, 'trust no one' - 2 views

  • The professor, Gloria Gadsden, thought she was only confiding sarcastically in her friends. But she told Inside Higher Ed she believed Facebook altered her settings so she had unknowingly allowed the "friends" of her online "friends" to read her postings.
  •  
    As far as high-tech misunderstandings go, this was a big one. An East Stroudsburg University sociology professor made two provocative posts on her Facebook page, according to the Web site Inside Higher Ed: "Does anyone know where to find a very discreet hitman? Yes, it's been that kind of day" and, "had a good day today, DIDN'T want to kill even one student :-) Now Friday was a different story."
Anne Bubnic

Schools Left in the Dust on the Social Media Highway - 4 views

  • "Our computer use policy is extensive. The frame is this is how you will use the computers when you are here, you can't go on these sites and do these things while you're at school, but when they get out from school and start using computers of their own to do some of these things, then it becomes a little bit more clouded," he said.
  • The problem NEOLA faces is a lack of law to base policies on regarding student and staff use of Facebook, Myspace, Twitter, etc. In turn, there are no policies for district administrators to follow, leaving a gray area for disciplinary issues. State legislature was passed regarding bullying, so NEOLA set policies based on that, but in terms of writing policy on technology, direction is what NEOLA is lacking.
Anne Bubnic

Social Media and Digital Citizenship - 2 views

  • Content filters, policies and guideline aren’t the final answer. If we are to have our students become true citizens we need to it though teaching.
Anne Bubnic

Seven Rules for Blog Comments - 1 views

  •  
    As students in Reading Workshop begin to build their blogs, post by post, the need for some structure in commenting is evident. Hopefully these guidelines will help students engage in meaningful dialogue, comment by comment. Here are seven rules for blog comments.
Anne Bubnic

Photos stolen and exploited on the internet - 4 views

  •  
    Here's the story about my daughter's pictures being stolen and exploited on the internet .
Anne Bubnic

Let's not create a cyberbullying panic - 0 views

  • As prominent as it is, bullying and cyberbullying are not the norm. Most young people want no part of bullying and consider it reprehensible behavior. Depending on what study you read, anywhere from 15 percent to 30 percent of teens say they have experienced some type of bullying or harassment from their peers.
  •  
    Adults need to be good role models. Politicians need to think about this the next time they consider demonizing (as opposed to criticizing) an opponent. Media personalities and talk show hosts need to think about the messages they're giving to children when they engage in name calling. We all need to be aware of comments we make in the presence of children and even people who comment on blogs need to think about the difference between legitimate criticism and derision. Children learn by observing our behavior, and there are plenty of adults who behave like bullies. Changing behavior isn't easy, but it's not impossible. I've been watching episodes of the TV show Mad Men, which is set in the 1960s when it was acceptable to smoke around other people, ride in cars without seat belts, leave trash everywhere, make derogatory comments about minorities, and treat women as inferior beings. We haven't yet completely eliminated any of those dangerous or antisocial behaviors, but we've come a long way. With concerted effort and national leadership, we can do the same with bullying.
« First ‹ Previous 81 - 100 of 127 Next › Last »
Showing 20 items per page