Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged their

Rss Feed Group items tagged

Anne Bubnic

Blocking the Future [AASA] - 1 views

  • In this environment, school district leaders have a critical choice to make: Will their schools pro-actively model and teach the safe and appropriate use of these digital tools or will they reactively block them out and leave students and families to fend for themselves?
  • o better way to highlight organizational unimportance than to block out the tools that are transforming the rest of society.
  • the specific policies are much less important than the general mindset of the school district.
  • ...4 more annotations...
  • If a district has decided to figure out ways to facilitate technology usage and empower students and staff, the policies will follow accordingly. Conversely, if a district is determined to treat technology from a fearful or wary standpoint, its policies will reflect that position as well.
  • they do have to exercise appropriate oversight and convey the message, repeatedly and often, that frequent, appropriate technology usage is both important and expected.
  • they have the right mindset. Their first reaction is not “keep this out” but rather “how we can make this work?” We can learn from these organizations how they have balanced safety concerns with the need to empower students with 21st century skills and dispositions.
  • lease don’t relegate your students, particularly those from disadvantaged backgrounds, to second-class status in the new economy because you left it to them and their families to figure out on their own what it means to be digital, global citizens.
  •  
    [May 2008] AASA article gives examples of school organizations that are desperately and inappropriately blocking the future and Scott McLeod pleads, "Please don't block the future." Please don't relegate your students, particularly those from disadvantaged backgrounds, to second-class status in the new economy because you left it to them and their families to figure out on their own what it means to be digital, global citizens. Ask AASA and its state affiliates to provide more technology leadership-related professional development opportunities. And let us know how we can help.
Anne Bubnic

Teaching Kids to Manage their Digital Footprint - 2 views

  •  
    Teaching kids to manage their Digital Footprint really starts with the adults. Teachers can't teach this effectively if they, themselves have not managed their own digital footprint. It is also important not to confuse managing a digital footprint with being hidden or private. Branding our identities has become more and more important in the digital age and if students and teachers aren't actively managing their digital footprint, then who is?
Anne Bubnic

Sexting and common sense - 0 views

  •  
    I am sure that Vermonters don't like the idea of teens sending sexy pictures from one phone to another. Nor do Ohio and Utah parents want their kids using cell phone minutes to bare their bodies with their buddies. Nevertheless, their state legislatures are among the first trying to sensibly ratchet down the penalties for sexting. They are backing away from laws that currently treat a teenager with a cell phone the same way they treat a child pornographer. They know there's a difference between truly dreadful judgment and a felony.
adjustingto6figu

Piercing the Single Member LLC (Limited Liability Company) - Adjusting to 6 Figures - 0 views

  •  
    Limited Liability Companies ("LLCs") are great vehicles for individuals and groups of people who are interested in protecting their personal assets from business liabilities while keeping their corporate tax return preparations fairly simple. Single Member LLCs ("SMLLCs") - LLCs containing only one individual - are fairly new in the world of business entities. Their use has proven to be quite popular, but their existence has also posed some fundamental legal questions.
adjustingto6figu

Effects of a Poorly Ventilated Attic - Adjusting to 6 Figures - 0 views

  •  
    Many homeowners are happy with a well-intact roof. They have no need to worry if there are no leaks coming through their ceiling, and their heating and cooling bills are in a normal range. They do not even think about other maintenance issues in their home until they become large enough to warrant an inspection. Many homeowners neglect their attic, unless maybe using it as storage space, even though this is one area that can benefit from a bit more attention.
buyglobalshop

Buy Bing Ads Accounts - Best Quality Everything Bing Ads Accounts 2024 - 0 views

  •  
    In the domain of online publicizing, Google AdWords is habitually considered the favored stage. Bing Advertisements, in any case, is a impressive competitor in the field of advanced publicizing. Microsoft claims Bing Advertisements, which gives companies and promoters with a extraordinary chance to utilize look motor showcasing to reach a expansive group of onlookers. Indeed in spite of the fact that Google is the industry pioneer in look motor promoting, Bing is still a enormous player with a sizable client base, which makes Bing Advertisements a alluring choice for individuals attempting to increment their online perceivability and site traffic. Buy Bing Ads Accounts Why ought to you open an account with Bing Ads? Online promoting has ended up fundamental for businesses to succeed in the current advanced time. It is presently more vital than ever for companies to contribute in promoting stages that permit them to proficiently reach their target gathering of people as the online commercial center extends. In spite of the fact that Bing Advertisements is a stage that ought to not be ignored, Google AdWords may be the stage that promptly springs to intellect when considering publicizing options. The promoting stage advertised by Microsoft's Bing look motor is called Bing Advertisements. Bing still keeps up a huge advertise share and gets millions of questions each day, in spite of not being as prevalent as Google. This suggests that you can reach a huge gathering of people of imminent clients who are effectively looking for products and administrations related with your company by making an speculation in a Bing Advertisements account. Buy Bing Ads Accounts Understanding Bing Advertisements: A Brief Overview? The ever-changing computerized scene of nowadays has made look motor publicizing a vital component of promoting plans. Companies are continuously looking for proficient strategies to interface with their target showcase and give quality leads. In terms of l
Anne Bubnic

Cell Phone Safety - 0 views

  • The fact that cell phones pose a great risk when combined with driving cannot be of any surprise to anyone. Let’s face it. First, drivers must take their eyes off the road while dialing. Second, people can become so absorbed in their conversations or other cell phone use that their ability to concentrate on the act of driving is severely impaired, jeopardizing the safety of vehicle occupants and pedestrians alike.
  • Time Away from Homework. Technology affords teens (and adults) a host of ways to do something other than what they are supposed to, in this case homework.
  • Mounting Minutes ($$$) Since consumers must be 18 in order to purchase a cell phone contract in the United States, most parents are buying the phones their children carry. This is good news because parents can choose a plan that fits how the cell phone will be used and can review monthly cell phone bills which typically includes a log itemizing phone activity. However, problems still exist. For one, children can quickly go over their allotted minutes for the month which can leave their parents with bills that can easily approach hundreds of dollars for the month.
  • ...1 more annotation...
  • Cell Phones and Gaming According to Sullivan (2004)3, when cellular phone games were simple, such as the knockoffs of the Atari-era "Breakout," there wasn't much to worry about. But newer phones with color displays and higher processing power create a landscape that might make some parents worried about what their kids are playing on the bus home from school.
  •  
    Today's cellular phones (cell phones) are more than just phones, they are hightech appliances that also serve as a mini-computers. Cell phones are electronic gadgets that allow users to surf the web, conduct text chats with others, take photos, record video, download and listen to music, play games, update blogs, send instant text messages to others, keep a calendar and to-do list, and more, much more. But cell phones also carry risks and cause distractions.
Anne Bubnic

Back to School Tips| Americans for Technology Leadership - 0 views

  • Cyberbullying Cyberbullying or online bullying is repeated, unwanted or cruel behavior against someone through computers, cell phones, gaming consoles, or other Internet-based means. The Internet is always “on,” opening the door for 24-hour harassment. Cyberbullies can be anonymous. They never have to confront their victims, they don’t have to be physically stronger and cyberbullies may be virtually invisible to parents and adults.
  • Look for warning signs your child may be the victim of cyberbullying – depression, lack of interest in school and friends, drop in grades and subtle comments that something may be wrong. If your child is the victim of cyberbullying, take action. By filtering email, instant messages and text messages, you can cut off many of the ways the cyberbullies contact your child. By having your child avoid the sites and groups where the attacks occur, he/she can ignore the bully. If harassment continues, change your child’s email address, user names and Internet account. If these steps do not stop the cyberbullying, contact the parents of the child who is behind the bullying, contact the school, and if the situation is not resolved, involve the police. It’s important to compile copies of harassing emails and postings to have evidence for authorities or the school, so they can take action. Look for signs that your child may be the cyberbully themselves – if they sign onto the Internet under someone else’s name, if they use someone else’s password without their permission, if they posted rude or mean things about someone else online, if they use bad language online, or if they changed their profile or away message designed to embarrass or frighten someone. Talk to your kids about cyberbullying and why it’s wrong and hurtful.
  •  
    As children go back to school, many parents are concerned about how their children will be using the computer and Internet devices in the classroom. Communication is key. Parents need to talk with their children about how to use the Internet safely, potential threats and appropriate usage of the Internet. By understanding both the benefits and the risks of Internet use, families can have a safer and more secure online experience. This article includes key tips on cyberbullying, internet safety, privacy and security.
anonymous

Online Predators and Their Victims - 0 views

  • My (Liz B. Davis ) Summary of Key Points (All are quotes directly from the article): Online "Predators" and Their Victims. Myths, Realities, and Implications for Prevention and Treatment. by: Janis Wolak, David Finkelhor, and Kimberly J. Mitchell - University of New Hampshire and Michele L. Ybarra - Internet Solutions for Kids, Inc.
  • The publicity about online"predators" who prey on naive children using trickery and violence is largely inaccurate.
  • adult offenders who meet, develop relationships with, and openly seduce underage teenagers
  • ...21 more annotations...
  • In the great majority of cases, victims are aware they are conversing online with adults. In the N-JOV Study, only 5% of offenders pretended to be teens when they met potential victims online. (112)
  • Offenders rarely deceive victims about their sexual interests.
  • promises of love and romance
  • 99% of victims of Internet-initiated sex crimes in the N-JOV Study were 13 to 17 years old, and none were younger than 12. 48% were 13 or 14 years old. (115)
  • ..Although Internet safety advocates worry that posting personal information exposes youths to online molesters, we have not found empirical evidence that supports this concern. It is interactive behaviors, such as conversing online with unknown people about sex, that more clearly create risk. (117)
  • take place in isolation and secrecy, outside of oversight by peers, family  members, and others in the youth's face-to-face social networks (115)
  • Most of the online child molesters described in the N-JOV Study met their victims in chatrooms. In a 2006 study, about one third of youths who received online sexual solicitation had received them in chatrooms. (116)
  • Youth internet users with histories of offline sexual or physical abuse appear to be considerably more likely to receive online aggressive sexual solicitations. (117)
  • it was those 15-17 years of age who were most prone to take risks involving privacy and contact with unknown people. (115)
  • We recommend educating youths frankly about the dynamics of Internet-initiated and other nonforcible sex crimes. Youths need candid, direct discussions about seduction and how some adults deliberately evoke and then exploit the compelling feelings that sexual arousal can induce. (122)
  • maintaining online blogs or journals, which are similar to social networking sites in that they often include considerable amounts of personal information and pictures, is not related to receiving aggressive sexual solicitation unless youths also interact online with unknown people. (117)
  • Boys constitute 25% of victims in Internet-initiated sex crimes, and virtually all of their offenders are male. (118
  • Some gay boys turn to the internet to find answers to questions about sexuality or meet potential romantic partners, and there they may encounter adults who exploit them. (118)
  • ..child molesters are, in reality, a diverse group that cannot be accurately characterized with one-dimensional labels. (118)
  • Online child molesters are generally not pedophiles. (118)Online child molesters are rarely violent. (119)
  • Child pornography production is also an aspect of Internet-initiated sex crimes. One in five online child molesters in the N-JOV Study took sexually suggestive or explicit photographs of victims or convinced victims to take such photographs of themselves or friends. (120)
  • Youths may be more willing to talk extensively and about more intimate matters with adults online than in face-to-face environments. (121
  • it may not be clear to many adolescents and adults that relationships between adults and underage adolescents are criminal. (122)
  • Simply urging parents and guardians to control, watch, or educate their children may not be effective in many situations. The adolescents who tend to be the victims of Internet-initiated sex crimes many not themselves be very receptive to the advice and supervision of parents. (122)
  • Online molesters do not appear to be stalking unsuspecting victims but rather continuing to seek youths who are susceptible to seduction. (117)
    • anonymous
       
      Let's remember that although there are direct references to gay and male pedophiles of gay boys, that 99% of child sex offenders identify as heterosexual, online or offline.
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
  •  
    This research article has the facts about sexual predatory behavior.
Anne Bubnic

Top 5 Ways Teens Are Compromising Their Identities Online [Video] - 0 views

  •  
    From Qwest Communications. Identity theft is the fastest growing crime in America with 18-29 year olds being the largest group of victims. Educating 13-18 year olds about how and why they are being targeted is critical in preventing new victims. Clean credit and a low level of identity theft awareness are two top reasons teens are targeted. A new survey from Qwest Communications Teen Council Program shows that an alarming number of teens are making it easier for thieves to steal their identity. With answers from more than 1,600 students about their online habits, the report identified the top 5 ways teens are compromising their identities.\n
buyglobalshop

Buy Shopify Accounts - 100% Best Quality Buy Or Sell Account - 0 views

  •  
    If you're looking to begin an online commerce, chances are you've listened of Shopify. But you may be pondering - what precisely is a Shopify account? Basically, a Shopify account is your door to making and overseeing your online store on the Shopify stage. It permits you to set up your store, customize your location, oversee stock, handle orders, and more. With a Shopify account, you have get to to a assortment of devices and highlights that make it simple to dispatch and develop your e-commerce business. Buy Shopify Accounts Are Shopify accounts secure? As online shopping proceeds to develop in ubiquity, it's vital for both customers and businesses to prioritize security when it comes to online exchanges. With the rise of e-commerce stages like Shopify, numerous trade proprietors are turning to these stages to make their online stores. Be that as it may, with the delicate data put away on these stages, the address emerges: Are Shopify accounts secure? In this article, we will investigate the different security measures in put to ensure Shopify accounts and the steps both businesses and customers can take to assist secure their online transactions. In later a long time, cyber assaults and information breaches have ended up all as well common, making it vital for businesses to take proactive measures to defend their online nearness. Shopify, as a driving e-commerce stage, has actualized a number of security highlights to secure accounts and client information. From encryption of touchy data to two-factor verification, Shopify endeavors to give a secure environment for online exchanges. In spite of these measures, it is still critical for trade proprietors to remain watchful and frequently audit their security settings to guarantee their information is protected. Buy Shopify Accounts What are the benefits of having a Shopify account? Having a Shopify account comes with a plenty of benefits that can raise your online trade to unused statures. One of the maj
Anne Bubnic

Social Networks Getting Slightly Less Social: Study - 5 views

  •  
    Users of online social network sites such as Facebook are increasingly editing their pages and tightening their privacy settings as they seek to protect their reputations in the age of digital sharing, a Pew Research Center survey said on Friday.
Judy Echeandia

Summer guide to cybersafety - 0 views

  • Today's child has a digital footprint the size of bigfoot (especially compared to us) and their online life is just as important to them as their "real" life.  How do we keep our children safe in this brave new world?  By educating them how to make the right decisions online and by modeling appropriate behavior on the internet.  Yes that means we need to exist in the virtual world so we can see, hear, and participate in the main street of the 21st century.
  •  
    "Today's child has a digital footprint the size of bigfoot (especially compared to us) and their online life is just as important to them as their "real" life. How do we keep our children safe in this brave new world? By educating them how to make the right decisions online and by modeling appropriate behavior on the internet. Yes that means we need to exist in the virtual world so we can see, hear, and participate in the main street of the 21st century."
Anne Bubnic

Terror in the Classroom: What Can be Done?, Part 4 - 0 views

  • A survey conducted by MSN United Kingdom found that 74% of teens as compared to 80% in this study did not go to anyone for advice when they were cyberbullied (www.msn.co.uk/cyberbullying, 2006). One reason some teenagers are reluctant to tell parents or adults is the fear of retaliation.
  • Many times parents don't get involved because they are afraid of invading their teen's privacy. Others may feel that as long as they have filtering software their teen is protected from negative material.
  • Parents need to be educated about cyberbullying- what it looks like, what the effects are and how to handle it. Rosalind Wiseman, educator and author of the best seller "Queen Bees & Wannabes", suggest parents consider the following: Use technology as an opportunity to reinforce your family values. Attach rules and consequences if inappropriate behavior occurs. Move the computer out of your child's bedroom and into the family room. Teach your child not to share passwords. Install monitoring and filtering software. Monitor your child's screen name(s) and Web sites for inappropriate content. If cyberbullying occurs, save and print out any evidence and decide whom you should contact for assistance.
  • ...1 more annotation...
  • n Tinker v. Des Moines Independent Community School District, 393 U.S. 503 (1969). The court ruled that a student's right to free speech can be limited when the speech "materially disrupts class work or involves substantial disorder or invasion of the rights of others." The standard of "material disruption" set by Tinker is often referred to by the courts
  •  
    What Can Parents Do? Schools should start addressing students, parents and staff about the issues of cyberbullying. Students need to be reminded that what they do in cyberspace is not really anonymous. They need to know their behaviors and words are downloadable, printable and sometimes punishable by law. The courts have given some direction for schools dealing with cyberbullying. "School districts are well within their legal rights to intervene in cyberbullying incidents - even if these incidents were initiated off-campus - if it can be demonstrated that the incident resulted in a substantial disruption of the educational environment"
Anne Bubnic

One in ten children have sexually explicit conversations on the internet, UK Study finds - 0 views

  • The annual Mobile Life report, commissioned by the Carphone Warehouse and the London School of Economics, says that 11 per cent of children aged 11 to 18 have had sexually explicit conversations online, with 28 per cent admitting they have accessed adult websites.
  • Many often pretend to be doing homework when in fact they surfing the internet, with 49 per cent saying that they lie to their parents about what they are doing online.
  • The reports, compiled from a survey of 6,000 people, also analysed the difference between American and British teenagers, with children in the UK emerging as much more sophisticated. For instance, 53 per cent of British youngsters have communicated by webcam, something that just 18 per cent of their American cousins have done.
  •  
    More than one in ten children has had a sexually explicit conversation online, according to a study that details how youngsters spend their time on the internet and their mobile phones.
Anne Bubnic

Cyberbullying with new technologies: How Teachers Should Respond - 0 views

  •  
    Fighting cyberbullying isn't just a technical problem. We need to educate children and young people to anticipate, recognize and deal with risks and problems as and when they arise. Children and young people will continue to give out their personal details so they need to be taught more about the management of personal information, both their own and other people's. More importantly they must be encouraged to become emotionally resilient in all areas of their daily lives.
Anne Bubnic

WEB|WISE|KIDS: MIRROR IMAGE [Interactive Software Adventure] - 0 views

  •  
    3rd in the Cybercop Series. MIRROR IMAGE tells the story of teenagers Sheena and Megan, best friends who are victimized by a criminal who uses the Internet to lure young women with promises of modeling contracts and online romance. Neither of the girls realizes that hacking software has been placed on their computers during their conversations with their 'online boyfriends.' Soon Sheena and Megan begin to suspect that someone is stalking them in real life. Players work with a detective to track the predator and arrest him. Available both as a home edition and a school edition. [Windows and Mac OSX versions available]
Anne Bubnic

SVUSD.tv - 0 views

  •  
    Here is an ambitious effort by the Saddleback Valley Unified School District [California], which has 39 schools in the district. They have their own Online-TV Station! Check out their news section and how they presented AERIES to their teachers. Very clever.
Anne Bubnic

Tweens Hooked on Phones - 0 views

  •  
    As any parent knows, tweens are crazy about cellphones. Those hoping to delay such a purchase--despite cries of "But everyone else has one!"--take note: 46% of U.S. tweens (ages 8 to 12) use cellphones, but only 26% own them, according to data released Wednesday by Nielsen Mobile. These "mobile borrowers" use their parents' phones when they go out with friends or on short trips, says Sally DePiro, a Nielsen product manager who worked on the report. The borrowing is more than an occasional habit: About 50% take their parents' phones more than three times a week. The key age for these early adopters is 10. While kids start using borrowed cellphones, on average, at around age eight-and-a-half, American tweens generally acquire their own phones between the ages of 10 and 11, reports Nielsen.
Anne Bubnic

A Vision of Students Today [Michael Wesch] - 0 views

  •  
    A short video summarizing some of the most important characteristics of students today - how they learn, what they need to learn, their goals, hopes, dreams, what their lives will be like, and what kinds of changes they will experience in their lifetime. Created by Michael Wesch in collaboration with 200 students at Kansas State University.
‹ Previous 21 - 40 of 708 Next › Last »
Showing 20 items per page