Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged take

Rss Feed Group items tagged

Anne Bubnic

Protecting Your Online Identity and Reputation - 0 views

  • Remember that nothing is temporary online. The virtual world is full of opportunities to interact and share with people around the world. It's also a place where nothing is temporary and there are no "take-backs." A lot of what you do and say online can be retrieved online even if you delete it — and it's a breeze for others to copy, save, and forward your information.
  • Mark your profiles as private. Anyone who accesses your profile on a social networking site can copy or screen-capture information and photos that you may not want the world to see. Don't rely on the site's default settings. Read each site's instructions or guidelines to make sure you're doing everything you can to keep your material private.
  • Safeguard your passwords and change them frequently. If someone logs on to a site and pretends to be you, they can trash your identity. Pick passwords that no one will guess (don't use your favorite band or your dog's birthday; try thinking of two utterly random nouns and mixing in a random number), and change them often. Never share them with anyone other than your parents or a trusted adult. Not even your best friend, boyfriend, or girlfriend should know your private passwords!
  • ...6 more annotations...
  • Don't post inappropriate or sexually provocative pictures or comments. Things that seem funny or cool to you right now might not seem so cool years from now — or when a teacher, admissions officer, or potential employer sees them. A good rule of thumb is: if you'd feel weird if your grandmother, coach, or best friend's parents saw it, it's probably not a good thing to post. Even if it's on a private page, it could be hacked or copied and forwarded.
  • Don't respond to inappropriate requests. Research shows that a high percentage of teens receive inappropriate messages and solicitations when they're online. These can be scary, strange, and even embarrassing. If you feel harassed by a stranger or a friend online, tell an adult you trust immediately. It is never a good idea to respond. Responding is only likely to make things worse, and might result in you saying something you wish you hadn't.
  • Take a breather to avoid "flaming." File this one under "nothing's temporary online": If you get the urge to fire off an angry IM or comment on a message board or blog, it's a good idea to wait a few minutes, calm down, and remember that the comments may stay up (with your screen name right there) long after you've regained your temper and maybe changed your mind.
  • Learn about copyrights. It's a good idea to learn about copyright laws and make sure you don't post, share, or distribute copyrighted images, songs, or files. Sure, you want to share them, but you don't want to accidentally do anything illegal that can come back to haunt you later.
  • Check yourself. Chances are, you've already checked your "digital footprint" — nearly half of all online users do. Try typing your screen name or email address into a search engine and see what comes up. That's one way to get a sense of what others see as your online identity.
  • Take it offline. In general, if you have questions about the trail you're leaving online, don't be afraid to ask a trusted adult. Sure, you might know more about the online world than a lot of adults do, but they have life experience that can help.
  •  
    Advice for teens from www.kidshealth.org. Here are some things to consider to safeguard your online identity and reputation:
    1. Remember that nothing is temporary online
    2. Mark your profile as private.
    3. Safeguard your passwords and change them regularly.
    4. Don't post inappropriate or sexually provocative pictures or comments.
    5. Don't respond to inappropriate requests
    6. Take a breather to avoid "flaming."
    7. Learn about copyrights.
    8. Check your digital footprint.
    9. Take it offline.
Anne Bubnic

Curbing Cyberbullying in School and on the Web - 0 views

  • Many of the most egregious acts of cyberbullying do not take place during school hours or on school networks, a situation that presents a dilemma for public school administrators: If they punish a student for off-campus behavior, they could get hit with a freedom of speech suit.  If they do nothing, students may continue to suffer and school officials theoretically could get hit with failure to act litigation. For school administrators, it appears to be an unfortunate “catch-22.” For lawyers, it’s a “perfect storm,” pitting freedom of speech advocates against the victims of cyberbullying and schools that try to intervene. There are no easy answers in this arena, few laws, and no well-established precedents that specifically deal with cyberbullying.
  • “School administrators can intervene in cyberbullying incidents, even if the incidents do not take place on school grounds, if they can demonstrate that the electronic speech resulted in a substantial disruption to the educational environment.”
  • These cases illustrate not only a lack of precedent on cyberbullying cases, but also a dilemma for school administrators on how to handle cyberbullying.  “There are few laws that address how to handle cyberbullying, and many schools don’t have an internal policy to deal with cyberbullying that takes place off-campus,” offers Deutchman.  “It may take an unfortunate and tragic event on school property to get more schools to consider tackling electronic behavior that originates off campus.  It’s only a matter of time before a cyberbully, or the victim of cyberbullying, uses deadly force during school hours.”
  • ...5 more annotations...
  • So, what should schools do in the meantime?  First, school officials should establish a consistent internal policy (much like a crisis plan) and a team (minimally made up of the principal, school counselor, and technology director) to deal with cyber-misconduct. This team should fully document disruptive incidents and the degree to which the learning environment is affected. The principal should invite the cyberbully’s parents to review the offending material before considering disciplinary action. Most parents at this point will do the right thing.
  • Second, schools should educate children, starting in elementary school, about the importance of cyber-safety and the consequences of cyberbullying, especially on the school’s own network. These rules should be clearly posted in the computer labs and written in age-appropriate language. The rules should be sent home to parents each year—and they should be posted prominently on the school’s website.
  • Third, teachers should continue incorporating in their curriculum projects that utilize the web and other powerful new technologies. This probably won’t help schools avoid lawsuits; it’s just good pedagogy. It’s not surprising that schools that keep up with the latest technology and software—and employ teachers who care about the quality of online communication—report lower incidents of cyber-misconduct.
  • In addition, schools should update their codes of conduct to include rules that can legally govern off-campus electronic communication that significantly disrupts the learning environment. They should also assign enough resources and administrative talent to deal with students who engage in cyber-misconduct. One very big caveat: Disciplining a student for off-campus electronic speech should be done only as a last resort, and certainly not before seeking legal counsel.
  • Finally, schools should realize that not all cyberbullies need to be disciplined. Schools should act reasonably, responsibly, and consistently—so as to avoid the very bullying behavior they are trying to curb. Until the courts provide clear standards in the area of off-campus electronic speech for young people, these recommendations will go a long way in making schools a safer learning environment for everyone.
  •  
    Most school administrators have more than one story to tell about cyberbullying. They report that victims of cyberbullying experience low self-esteem, peer isolation, anxiety, and a drop in their grades. They note that victims may miss class or other school-related activities. Principals also point to recent high-profile cases where cyberbullying, left unchecked, led to suicide. In response, some schools have created new policies and curbed free speech on the school's computer network and on all electronic devices used during school hours. This article offers practical advice for actions schools can take to curb bullying, ranging from policy development to education.
Anne Bubnic

As 'Trolling' Turns More Vicious, What, If Anything, Can Stop It? - 0 views

  •  
    One afternoon in the spring of 2006, for reasons unknown to those who knew him, Mitchell Henderson, a seventh grader from Rochester, Minnesota, took a .22-caliber rifle down from a shelf in his parents' bedroom closet and shot himself in the head. The next morning, Mitchell's school assembled in the gym to begin mourning. His classmates created a virtual memorial on MySpace and garlanded it with remembrances. One wrote that Mitchell was a "hero to take that shot, to leave us all behind. God do we wish we could take it back." Someone e-mailed a clipping of Mitchell's newspaper obituary to MyDeathSpace.com, a Web site that links to the MySpace pages of the dead.
Anne Bubnic

MySpace.com - Pause - 0 views

  •  
    It only takes a minute to change your life. In this collaboration with the Kaiser Family Foundation, the PAUSE campaign recognizes that in a minute, everything can change. Impulsive behaviors are part of being young. Through the campaign, Fox Networks Group and Kaiser hope to encourage young people to "pause" - even if just for sixty seconds -- when confronted with a difficult or risky decision, consider the best option, and reach out to get more information and help if they need it. In that minute, they have the choice to make a good or bad call. As PAUSE indicates, "it only takes a minute to change your life." For a young person, that kind of power can be intimidating, yet also very empowering. Site includes PSA's targeting youth and informational resources.
Anne Bubnic

Tweens Hooked on Phones - 0 views

  •  
    As any parent knows, tweens are crazy about cellphones. Those hoping to delay such a purchase--despite cries of "But everyone else has one!"--take note: 46% of U.S. tweens (ages 8 to 12) use cellphones, but only 26% own them, according to data released Wednesday by Nielsen Mobile. These "mobile borrowers" use their parents' phones when they go out with friends or on short trips, says Sally DePiro, a Nielsen product manager who worked on the report. The borrowing is more than an occasional habit: About 50% take their parents' phones more than three times a week. The key age for these early adopters is 10. While kids start using borrowed cellphones, on average, at around age eight-and-a-half, American tweens generally acquire their own phones between the ages of 10 and 11, reports Nielsen.
Anne Bubnic

AT&T | Texting & Driving - It Can Wait - 1 views

  •  
    A resource for all wireless users on the dangers of texting while driving. Take the pledge not to text and drive. To honor those taking the pledge, AT&T will contribute to non-profit organizations focused on youth safety.
Anne Bubnic

Teachable Moment: Digital Illiteracy - 1 views

  •  
    Higher ed requires incoming freshmen to take Composition and some form of math, and so, too, should universities require students to take a course that helps them identify reputable information in the vast expanse of the web.
Anne Bubnic

Cyberbullying: A Legal Review - 1 views

  • If the disruption or danger can be clearly enunciated and quantified, student discipline is likely warranted and legally appropriate.
  •  
    School officials are justifiably concerned about when and how to respond to cyberbullying of educators. What actions, if any, should administrators and teachers take when faced with such occurrences? Which responses will stand up in a court of law? Educators' most important first response is to pause, step back, and take a deep breath. Administrators and teachers must avoid reacting to students' offensive online communications in anger or fear.
Kevin Rose

Fast Short Term Loans - Gather The Few Tips To Assist You In Taking Right... - 0 views

  •  
    Gather The Few Tips To Assist You In Taking Right...
Devia Rajput

Responsibility of Asian team's security takes By Rajeev Shukla - 0 views

  •  
    Responsibility of Asian team's security takes By Rajeev Shukla.He asked Asian nation Cricket Board (PCB) to inform the rationale of not causation their team to The Asian nation for International Cricket Council (ICC) Twenty20.
Devia Rajput

Human Body Top 10 Incredible Details - 0 views

  •  
    Today You guys see human body top 10 incredible details . you should have to read that article.Human Body is the collection of several parts which needed to do different functions which look many effortless. It can take inputs from 5 organs, make decisions depending on inputs and take necessary depending on inputs.
realcounterfeits

Real canadian drivers license for sale - Real Counterfeits Money - 0 views

  •  
    Obtain a driving license in Canada with no paperwork Driving in Canada may be a unique experience for newcomers since the cities are often quite spacious with far-off neighborhoods. Just like any other country, you need a permit to get around. Based on the province you are moving to and the country you are coming from, you may be able to get an international driver's license in Canada. If you are not eligible for conversion, you have to give an exam followed by road tests. It may take up to two years to get a permanent license. Furthermore, there are hefty costs associated with driving tests and cancellations. No one would be amused by this hectic procedure, which is why we came up with a platform where you can buy a driver's license in Canada. No need to take exams or furnish legal documents. We take care of everything!. Buy real canadian drivers license Where to get a fake Canadian driver's license with legitimate features? There are counterfeiters on the market who will dupe you with substandard quality documents that don't match the security criteria. At 2nd license, we are very serious about maintaining the authenticity of Canadian driving licenses at the cost of skill and craftsmanship. From holograms and watermarks to HD photos and database registration, we cover everything to keep you safe. You are welcome to contact us and understand the process we follow. Being transparent is the key to our success, and we are always willing to take up your questions. Buy Canadian Drivers License online real canadian drivers license
lipikamohanty

24Hour Nursing Care| Health care at home|Tech Tricks health care| - 0 views

  •  
    After a Critical Surgery and Serious Injury, a patient must need a trained personal caregiver at home to fulfilling their daily basic needs, their family members are unable to help them because they are not medically trained, in how to handle a critical patient and care for them. At that time a patient needs a 24-hour Nursing care service from a well-trained nurse and more support staff, those who take care of critical patients, old people, sick bedridden patients, pregnant women, and newborn babies care at home. 24 Hour Nursing care at Home Involves: * checking wounds/ Dressing * oxygen administration * Ventilator care * BiPAP/ CPAP Monitoring * reviewing medications * Monitoring and concern about medical history and symptoms. * Take reading the blood Pressure, Temperature, heart rate, and breathing. * to check on the diet of the patient * daily checkups, Physiotherapy, and diagnostic tests * observing their physical and mental status, support them emotionally in hurry to recover. * Educating and advising the patients on their health and well-being. Tech Tricks health care service provides 24 hours Nursing care for helping people in their critical times, providing nurses at home for their locations, all over Odisha. they are always active and provide their health care service, and arrange all medical facilities anywhere you search the service at home. http://www.techtrickshealthcare.com/nursingservice.php
Dean Mantz

academyofdiscovery - Internet Safety - 8 views

  • I will never post any information more personal than my first name nor will I post pictures of myself. I will not plagiarize, instead I will expand on others' ideas and give credit where it is due. I will use language appropriate for school. I will not insult my fellow students or their writing. I will only post pieces that I am comfortable with everyone seeing; other pieces I will keep as drafts. I will not be afraid to express my ideas, while not overgeneralizing or making derogatory/inflammatory remarks; any posts or edits on controversial issues must either be submitted to Mr. Wilkoff prior to posting or be a part of a classroom project/question which addresses controversial issues. I will use constructive/productive/purposeful criticism, supporting any idea, comment, or critique I have with evidence. I will take all online content creation seriously, posting only things that are meaningful and taking my time when I write. I will try to spell everything correctly. I will not use my public writing (blog posts, comments, discussion topics, wiki edits) as a chat room, instead, I will save IM language for private conversations. I will not bully others in my blog posts or in my comments. I will never access another student's account in order to pose as them or look at their personal content, but I will advise them when they haven't logged out of their computer from my own account. I will be proactive in monitoring the comments that others leave on my blog, utilizing the comment blacklist if necessary. I will personalize my blog and keep my writing authentic, while taking responsibility for anything blogged in my name. I will not provoke other students in my blog posts or comments. I will use my online content as an extension of the classroom, and in doing so, I will leave anything that unsaid in the classroom unsaid online. I will only post photos which are school appropriate and either in the creative commons or correctly cited. I will not spam (including, but not limited to meaningless messages, mass messages, and repetitive messages) I will only post comments on posts that I have fully read, rather than just skimmed. I will respect the public nature of online information, and in doing so, I will respect the wishes of my fellow students for keeping their information (full name, compromising stories, etc.) private.
Anne Bubnic

Students take online revenge on teachers - 0 views

  •  
    Students are taking a high-tech approach to revenge on teachers - assuming their identities in fake online profiles and putting doctored photographs of them on the internet. The modern trend - dubbed "worrying" this week by the secondary teachers' union - appears to have firmly taken hold in New Zealand this year. It is an extension of the problem of teenagers cyber-bullying their peers and follows the trend of fake profiles created for celebrities and politicians.
Anne Bubnic

Cell Phone Safety - 0 views

  • The fact that cell phones pose a great risk when combined with driving cannot be of any surprise to anyone. Let’s face it. First, drivers must take their eyes off the road while dialing. Second, people can become so absorbed in their conversations or other cell phone use that their ability to concentrate on the act of driving is severely impaired, jeopardizing the safety of vehicle occupants and pedestrians alike.
  • Time Away from Homework. Technology affords teens (and adults) a host of ways to do something other than what they are supposed to, in this case homework.
  • Mounting Minutes ($$$) Since consumers must be 18 in order to purchase a cell phone contract in the United States, most parents are buying the phones their children carry. This is good news because parents can choose a plan that fits how the cell phone will be used and can review monthly cell phone bills which typically includes a log itemizing phone activity. However, problems still exist. For one, children can quickly go over their allotted minutes for the month which can leave their parents with bills that can easily approach hundreds of dollars for the month.
  • ...1 more annotation...
  • Cell Phones and Gaming According to Sullivan (2004)3, when cellular phone games were simple, such as the knockoffs of the Atari-era "Breakout," there wasn't much to worry about. But newer phones with color displays and higher processing power create a landscape that might make some parents worried about what their kids are playing on the bus home from school.
  •  
    Today's cellular phones (cell phones) are more than just phones, they are hightech appliances that also serve as a mini-computers. Cell phones are electronic gadgets that allow users to surf the web, conduct text chats with others, take photos, record video, download and listen to music, play games, update blogs, send instant text messages to others, keep a calendar and to-do list, and more, much more. But cell phones also carry risks and cause distractions.
Anne Bubnic

Broward County schools ready to take on bullies - 0 views

  •  
    When school starts today, Broward County schools will be armed to take action against you.A new district policy, adopted July 22, allows a range of punishments, from "positive behavioral interventions" to suspensions for students, to sanctions against teachers' certificates for "egregious acts of bullying." Included are cyber-stalking and cyber-bullying, which experts say are becoming more common among South Florida students.
Anne Bubnic

Taking risky opportunities in youthful content creation. - 0 views

  •  
    Taking risky opportunities in youthful content creation: teenagers' use of social networking sites for intimacy, privacy and self-expression.
    The explosion in social networking sites such as MySpace, Facebook, Bebo and Friendster is widely regarded as an exciting opportunity, especially for youth.Yet the public response tends to be one of puzzled dismay regarding a generation that, supposedly, has many friends but little sense of privacy and a narcissistic fascination with self-display. This article explores teenagers' practices of social networking in order to uncover the subtle connections between online opportunity and risk. Reprints of the complete article are available for a fee from Sage Publishing.
Anne Bubnic

The Road to Cybersafety - 0 views

  • Carrill is part of the Platte County Sheriff’s Office. He also leads the Western Missouri Cyber Crimes Task Force. One of his primary missions is to track down and arrest online predators who trade in child pornography.And all these cameras only make his job more challenging. About 40 percent of the nation’s minors have access to Webcams, Carrill explained, devices for uploading live video to the Internet. About 65 percent of all children have access to cell phone cameras.
  • erhaps the biggest issue is that fact that kids don’t understand that when a picture is posted online, it’s nearly impossible to remove.“Once that image is taken, it’s out there forever,” Shehan said. “The No. 1 issue that we’ve seen with Webcams is teenagers self-producing pornography.”
  • All we can tell them is, ‘I’m sorry,’” Carrill said. “The minute the camera clicks, you no longer own that image. It has the potential to harm that person years from now.”A Webcam placed in a child’s bedroom is another bad combination, according to Shehan and Carrill. Sexual predators search for kids who use Webcams in the privacy of their own rooms, then lure or blackmail the child into providing pictures of themselves.“We see cases time after time of children who take pictures, send them to a predator and get a pornographic collage back that the predator uses to blackmail the child into providing more images,” Shehan said.
  • ...3 more annotations...
  • . About 40 percent of the nation’s minors have access to Webcams, Carrill explained, devices for uploading live video to the Internet. About 65 percent of all children have access to cell phone cameras.Carrill’s team recently started a new operation to search image-trading Web sites for known child pornography in Missouri. The results were frightening, he said. More than 6,000 images were found in the state; about 700 of those pictures were downloaded in the Kansas City area.Between sexual predators who fish for images and immature decisions by kids with cameras, more children are either having their images posted online or being exposed to pornography, according to a 2006 report by the National Center for Missing and Exploited Children.
  • In the end, the best tool to defeat child pornography is parent education, according to both Shehan and Carrill. More than anything, kids need to know they can trust their parents.“It’s through that open line of communication between the parent and child that they can work through or prevent bad situations,” Carrill said.
  • All parents should follow a few basic rules when it comes to cyber safety, according to experts:- Keep computers in common areas of the home.- Monitor Internet use by children.- Enable privacy protection software.- Turn Webcams off or protect them with a password.- Track what images are being uploaded by children in the household.- Talk to children about what is appropriate.
  •  
    Webcams, cell phone cameras being put to troubling use, experts say. People are taking pictures, lots of them, and then uploading them as permanent displays in the Internet collection.
Anne Bubnic

'Video-Gaming' Child Predators Offering Points For Nude Photos - 0 views

  • Maurer is warning parents to take precautions when it comes to gaming consoles because most are hooked to the Internet and anyone can be chatting with children during game play. IBSYS.ad.AdManager.registerPosition({ "iframe": false, "addlSz": "", "element": "ad_N6C0061.2D12", "interstitials": false, "beginDate": "", "endDate": "", "getSect": "", "name": "square", "qString": "", "width": "300", "height": "250", "section": "", "useId": "16995600", "interactive": false, "useSameCategory": false, "topic": "", "swSectionRoot": "", "useZone": "", "type": "DOM" }); "My theory on it is that predators are going to go where kids are, and kids are playing video games so it's a perfect place for them to be," Maurer said.
  •  
    Child predators offering game points in exchange for nude images through Internet-connected video games have prompted a warning for parents. "Kids are playing games, and they are being asked to take photos of themselves naked in order to get game points," state attorney Cybercrime Detective Lt. David Maurer said. "There is not only the chatting version of the games but also a webcam involved."
1 - 20 of 228 Next › Last »
Showing 20 items per page