Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged this

Rss Feed Group items tagged

Vicki Davis

Internet Safety - 0 views

  •  
    Internet Safety site that has won some awards -- I want to know the balance of this information and if it shows all aspects of the issue. I would love to have someone do a full review on this one.
  •  
    This site is full of information about the scary side of the Internet -- it talks about predators and what they look like. It also shows predator warning signs, which could be interesting. I'm curious to see if there is balance and where their facts come from. This is targeted to age 10 and up. There are games and other things in here. I'd like to know some people who have been through this material. It won an award in 2007
  •  
    Note: this is the same site I posted earlier -as THINKQUEST AWARD WINNER 2007: Internet Safety, Keeping it Real." This Thinkquest Project does focus on the dark side of the Internet, perhaps excessively, our CTAP team thought. But it was created by 6th graders and they are to be commended for their effort. Anyone else here a Thinkquest judge? Judging starts today, actually. It's grueling but a rewarding effort. And you get to see some pretty cool stuff!
adjustingto6figu

Why Should You Become an Independent Claims Adjuster?  - Adjusting to 6 Figures - 0 views

  •  
    There are many professions in the world that promise to be rewarding and fulfilling. Becoming and independent claims adjuster is one of them. Though this might not be a profession you have heard of before, it does pay a substantial amount and is in high demand. It is a serious decision to follow this career path, and worth considering if you are looking for a stable career where you can help others and where you are able to make your own decisions. If you want to be in charge of your own day, travel, and set your own schedule, then this is the perfect opportunity, as an adjuster works independently in the field, and is responsible for his own work. This article will provide a look at the role of an independent claims adjuster, the duties it entails, and what the benefits are to taking on this type of position.
solospiders

Best Beard Grooming Kit 2020 - 0 views

  •  
    Want to hear something funny?? The local mega mall fancy shave store is selling beard brushes for $60! That's $-6-0 dollars! Dude. Forget the fancy shave store brush. Get this one. This one even comes with a classy wooden comb! Fancy shave store didn't even have that! I like this brush - good size, good bristles. Some combs are too big, this one feels about right. And the price! You can't beat the price for this quality. Comes with a cool little bag. Not sure if the fancy shave store had that - I couldn't get past the price. And comes with eco friendly box that you can immediately throw into your recycling bin. What's not to like?
Vicki Davis

Reflection - Horizon Project 2008 - 0 views

  •  
    This 10th grade student has written an exceptional post-project reflection. I hope you'll take time to read it. Here is an excerpt:\n\n"There is no doubt that this technology is dangerous. It is apparent that few people, not adults, not teenagers, truly understand how collaboration, conduct, and manners affect the internet. This project has to teach others that as well. It is necessary to know how to handle yourself on the internet. That's why Horizon Project is so important. We have to educate tomorrow's leaders how to use new technology without abusing it. The highlight of this project is the education we are giving every single person who has been a part of the Horizon Project."
  •  
    An excellent post about how doing global collaborative projects can educate students on the safety they need. This is from a 10th grader.
Anne Bubnic

Flickr Perversion - 1 views

  • These photos of these girls were without a doubt being sexualized, and my four-year-old daughter was amongst these images.
  •  
    This is why I don't share the photos of my children online in public places. After one pic of a child at school was favorited in this way, I took the pic down and am ridiculously vigilant about checking to see how many photos have been favorited and which ones to see if there is one that some sicko has looked at. This is an article I'm going to share with my digiteen dream team! It is an important one to share!
  •  
    In January 2009, Alex Couros received an email notice saying that a few of his Flickr photos had been favorited. These particular photos were of his children, mostly of his daughter. Every time this happens, he goes to see who the Flickr user is, and most of the time, it is a family member, a close friend, or someone he know through Twitter (or other social network). He did not recognize the user in this particular case, and when he went to see their photos, the Flickr message alerted him that none of the user's photos were available. Seeing as his photos had been favorited, he went to see what other photos had been marked as favorites by this user.
Anne Bubnic

Digital Natives/Digital Dossiers [video] - 0 views

  •  
    Your digital dossier is made up of all the digital tracks you leave behind - from your photos on Flickr, to the Facebook messages you send, to all the data your credit card company collects about your transactions. On a daily basis, digital natives are consistently leaving information about themselves in secure or non-secure databases. You probably do this without a second thought in you day-to-day life - but have you ever considered the amount of information being collected about you, or the extent to which this information spreads?\nIn this video, created by Kanupriya Tewari, we explore this issue from the perspective of a child born today - Andy - and the timeline of all the digital files he accumulates in a life span.
solospiders

Front Door Wreath - 0 views

  •  
    This Front Door Wreath is very cute & well made! I have searched for a wreath like this in various stores, but this one is by far more affordable. The leaves are full & bright. It seems to durable & holds up in windy weather. The Babys Breath wreath with plastic green and pink Babys Breath leaves and sturdy plastic ring backing,UV resistant Wreath, Green Colors,realistic and natural.We use plentiful artificial Gypsophila branches with mini green leaves for the extra full look! This wreath would look beautiful against your front door or even displayed on a covered patio. It really adds a nice color & look to my front door
Vicki Davis

Do You Read Blocked Blogs? at Change Agency - 0 views

  • This morning, Bud The Teacher, posted a request for designs for a 21st Century version of the “I Read Banned Books” buttons that we are all so familiar with. In response to this request, I played around with an idea:
  •  
    Bud the Teacher and Stephanie Sandifer are planning an I read blocked blogs day. This is going to be an event for educators advocating access. It would also be a great time to talk about ways to monitor when you provide access. This also happens to be the first aspect of ad4dcss and we've listed it on the wiki. They have shirts that people can get and buttons for your blog.
  •  
    This is going to be a great project.
Anne Bubnic

Virtual World Digital Citizenship for Middle Schoolers - 0 views

  •  
    This documents students using Google Lively to teach other students about digital citizenship
  •  
    For our project, we chose to create a virtual room, called Digiteen World, on Google Lively. Our main objective of this project is to get people more aware about Digital Citizenship. We will be allowing kids from our school to get on Lively, and react in the virtual world. We have created nine superheroes. Each superhero has a lesson to teach abut the nine aspects of Digital Citizenship. By teaching the lessons in a virtual room, the kids get to have a great time and still learn very important lessons. The goal of this project is to educate people on how to act online. In allowing kids to be a part of this project, we hope that they will learn how to be good digital citizens.
Vicki Davis

SurfTheChannel - 0 views

  •  
    Networks are evolving so that people may customize what is sent to them. Again, the best filter in the world is the human brain and through RSS, people will have access to many things (that will make it through your firewall.) This is an example of a space for TV buffs that is increasing in interest in the entertainment field.
  •  
    This is a website where tv enthusiasts are sharing videos and collaborating. This is an example of how television and all of our entertainment is evolving to become more customized.\n\nIn addition to creating personal learning networks, we will also be creating personal entertainment networks (PEN's) -- all via this amazing thing we call RSS. Understanding RSS is not only important for learning but just living your life.\n\nUser created content is here to stay.
Anne Bubnic

Letters To A Bullied Girl: Messages of Healing & Hope [New Book] - 0 views

  • Olivia Gardner, a teenager from Northern California, had been severely bullied in school. After reading of her ordeal in a local newspaper, we were shocked. Olivia had endured so much pain. Her book bag had been dragged through the mud, her schoolmates had created an "Olivia's Haters" page on the internet, and they would whisper "Die Olivia" to her in the halls. Olivia's story broke our hearts, especially when we learned that she was suicidal. We couldn't imagine such cruelty.
  • livia's story moved us, and a spark ignited between us - we both recognized that there was something that had to be done about this situation. We knew we couldn't be bystanders. We organized a letter-writing campaign and asked our friends to write letters of encouragement to Olivia. These messages of healing and hope were the least we could send to Olivia to let her know that she was not alone and that we were thinking about her and hoping she would get better.
  • Heartfelt, honest and powerful letters started pouring in. And then came the media requests. The more attention the "Olivia's Letters" project got, the more letters we received. Suddenly, we were thrust into the world of bullying, as we read the letters sent to Olivia by former bullies and targets of these bullies. We learned of the remorse adults felt having been bullies themselves in their teen years, and of the depression the targets of bullies still experience years after they have been bullied. Thousands of letters from all over the country and even the world flooded into Olivia's mailbox, each offering a unique perspective on courage and compassion.
  • ...2 more annotations...
  • We could never have predicted what a great and widespread response our little project to help one girl would receive. In a matter of a few weeks we became activists. Today, as the authors of the book Letters to a Bullied Girl: Messages of Healing and Hope, a compilation of some of the most revealing letters sent to Olivia, we are hopeful that the letter-writers' message to end the vicious cycle of bullying will continue to spread
  • As the letters in this book prove, bullying has serious consequences. We can no longer turn away or sit idly by as our peers are bullied so severely and relentlessly that they are forced to withdraw, isolate themselves and even turn to suicide. Our book is dedicated to Corinne Sides, who committed suicide as a result of bullying, and there are pages of letters from others who attempted suicide to escape their bullies.
  •  
    As teens across the country head back to school this year, far too many of them are facing the entrance doors to their schools with feelings of fear, trepidation and dread. For an increasing number of students across the nation, schooldays are filled with the never-ending cycle of taunting and abuse from their bullies. But this year, in an unprecedented display of solidarity, thousands of strangers who have been through the same harrowing experiences, are sharing their private tales of torment with these teens for the first time ever because of the story of Olivia Gardner.
Anne Bubnic

Curbing Cyberbullying in School and on the Web - 0 views

  • Many of the most egregious acts of cyberbullying do not take place during school hours or on school networks, a situation that presents a dilemma for public school administrators: If they punish a student for off-campus behavior, they could get hit with a freedom of speech suit.  If they do nothing, students may continue to suffer and school officials theoretically could get hit with failure to act litigation. For school administrators, it appears to be an unfortunate “catch-22.” For lawyers, it’s a “perfect storm,” pitting freedom of speech advocates against the victims of cyberbullying and schools that try to intervene. There are no easy answers in this arena, few laws, and no well-established precedents that specifically deal with cyberbullying.
  • “School administrators can intervene in cyberbullying incidents, even if the incidents do not take place on school grounds, if they can demonstrate that the electronic speech resulted in a substantial disruption to the educational environment.”
  • These cases illustrate not only a lack of precedent on cyberbullying cases, but also a dilemma for school administrators on how to handle cyberbullying.  “There are few laws that address how to handle cyberbullying, and many schools don’t have an internal policy to deal with cyberbullying that takes place off-campus,” offers Deutchman.  “It may take an unfortunate and tragic event on school property to get more schools to consider tackling electronic behavior that originates off campus.  It’s only a matter of time before a cyberbully, or the victim of cyberbullying, uses deadly force during school hours.”
  • ...5 more annotations...
  • So, what should schools do in the meantime?  First, school officials should establish a consistent internal policy (much like a crisis plan) and a team (minimally made up of the principal, school counselor, and technology director) to deal with cyber-misconduct. This team should fully document disruptive incidents and the degree to which the learning environment is affected. The principal should invite the cyberbully’s parents to review the offending material before considering disciplinary action. Most parents at this point will do the right thing.
  • Second, schools should educate children, starting in elementary school, about the importance of cyber-safety and the consequences of cyberbullying, especially on the school’s own network. These rules should be clearly posted in the computer labs and written in age-appropriate language. The rules should be sent home to parents each year—and they should be posted prominently on the school’s website.
  • Third, teachers should continue incorporating in their curriculum projects that utilize the web and other powerful new technologies. This probably won’t help schools avoid lawsuits; it’s just good pedagogy. It’s not surprising that schools that keep up with the latest technology and software—and employ teachers who care about the quality of online communication—report lower incidents of cyber-misconduct.
  • In addition, schools should update their codes of conduct to include rules that can legally govern off-campus electronic communication that significantly disrupts the learning environment. They should also assign enough resources and administrative talent to deal with students who engage in cyber-misconduct. One very big caveat: Disciplining a student for off-campus electronic speech should be done only as a last resort, and certainly not before seeking legal counsel.
  • Finally, schools should realize that not all cyberbullies need to be disciplined. Schools should act reasonably, responsibly, and consistently—so as to avoid the very bullying behavior they are trying to curb. Until the courts provide clear standards in the area of off-campus electronic speech for young people, these recommendations will go a long way in making schools a safer learning environment for everyone.
  •  
    Most school administrators have more than one story to tell about cyberbullying. They report that victims of cyberbullying experience low self-esteem, peer isolation, anxiety, and a drop in their grades. They note that victims may miss class or other school-related activities. Principals also point to recent high-profile cases where cyberbullying, left unchecked, led to suicide. In response, some schools have created new policies and curbed free speech on the school's computer network and on all electronic devices used during school hours. This article offers practical advice for actions schools can take to curb bullying, ranging from policy development to education.
Vicki Davis

A Silent World - 0 views

  • This is an oxymoron since I have no intent of being silent. But as of now, everyone is so afraid to speak out against things that are corrupt and wrong that we have become a silent world.
  •  
    A student sample public blog that has done a good job of protecting identity but still having voice. This is on blogger.
  •  
    This student I know started this blog to write about things. Notice that the student has done a pretty good job of keeping things private about his/her identity.
Vicki Davis

digiteen » Digital Law - 0 views

  •  
    One of the best wikis on the digiteen project, this wiki covering digital law is marvelous and was put together by 9 students from my classroom here in the US, Qatar, and Austria. This is an excellent wiki on Digital Law and has made my wiki hall of fame for this year! Wow!
  •  
    Amazing wiki put together by an international team of 9th graders on digital law.
Anne Bubnic

i-SAFE Lesson Guide: Phishing for Information - 0 views

  •  
    Download this lesson plan from I-Safe which introduces students to the term phishing and the threat of identity theft associated with this type of e-mail. Students will:
    *understand the term phishing and the types of e-mail it applies to
    * understand the security risks associated with this type of message
    *engage in an activity to reinforce concepts by sharing information with others
Anne Bubnic

2 Million Minutes : A Documentary Film on Global Education - 0 views

  •  
    How a student spends their Two Million Minutes - in class, at home studying, playing sports, working, sleeping, socializing or just goofing off -- will affect their economic prospects for the rest of their lives. How do most American high school students spend this time? What about students in the rest of the world? How do family, friends and society influence a student's choices for time allocation? What implications do their choices have on their future and on a country's economic future?
    This film takes a deeper look at how the three superpowers of the 21st Century - China, India and the United States - are preparing their students for the future. As we follow two students - a boy and a girl - from each of these countries, we compose a global snapshot of education, from the viewpoint of kids preparing for their future.

    \n\nThe complete DVD is available for order on this web site. The web site also offers a preview version.
Anne Bubnic

Cyber Bullying [PBS Radio Discussion] - 0 views

  •  
    Caught part of this on WBEZ yesterday morning and thought it might be a useful resource.
  • ...2 more comments...
  •  
    Caught part of this on WBEZ yesterday morning and thought it might be a useful resource.
  •  
    One problem that faces children today takes place not in school, but in cyberspace. Writer Kathe Telingator has this tale of dealing with an anonymous bully.\n
  •  
    Caught part of this on WBEZ yesterday morning and thought it might be a useful resource.
  •  
    One problem that faces children today takes place not in school, but in cyberspace. Writer Kathe Telingator has this tale of dealing with an anonymous bully.
anonymous

Online Predators and Their Victims - 0 views

  • My (Liz B. Davis ) Summary of Key Points (All are quotes directly from the article): Online "Predators" and Their Victims. Myths, Realities, and Implications for Prevention and Treatment. by: Janis Wolak, David Finkelhor, and Kimberly J. Mitchell - University of New Hampshire and Michele L. Ybarra - Internet Solutions for Kids, Inc.
  • The publicity about online"predators" who prey on naive children using trickery and violence is largely inaccurate.
  • adult offenders who meet, develop relationships with, and openly seduce underage teenagers
  • ...21 more annotations...
  • In the great majority of cases, victims are aware they are conversing online with adults. In the N-JOV Study, only 5% of offenders pretended to be teens when they met potential victims online. (112)
  • Offenders rarely deceive victims about their sexual interests.
  • promises of love and romance
  • 99% of victims of Internet-initiated sex crimes in the N-JOV Study were 13 to 17 years old, and none were younger than 12. 48% were 13 or 14 years old. (115)
  • it was those 15-17 years of age who were most prone to take risks involving privacy and contact with unknown people. (115)
  • take place in isolation and secrecy, outside of oversight by peers, family  members, and others in the youth's face-to-face social networks (115)
  • Most of the online child molesters described in the N-JOV Study met their victims in chatrooms. In a 2006 study, about one third of youths who received online sexual solicitation had received them in chatrooms. (116)
  • Youth internet users with histories of offline sexual or physical abuse appear to be considerably more likely to receive online aggressive sexual solicitations. (117)
  • ..Although Internet safety advocates worry that posting personal information exposes youths to online molesters, we have not found empirical evidence that supports this concern. It is interactive behaviors, such as conversing online with unknown people about sex, that more clearly create risk. (117)
  • Online molesters do not appear to be stalking unsuspecting victims but rather continuing to seek youths who are susceptible to seduction. (117)
  • maintaining online blogs or journals, which are similar to social networking sites in that they often include considerable amounts of personal information and pictures, is not related to receiving aggressive sexual solicitation unless youths also interact online with unknown people. (117)
  • Boys constitute 25% of victims in Internet-initiated sex crimes, and virtually all of their offenders are male. (118
  • Some gay boys turn to the internet to find answers to questions about sexuality or meet potential romantic partners, and there they may encounter adults who exploit them. (118)
  • ..child molesters are, in reality, a diverse group that cannot be accurately characterized with one-dimensional labels. (118)
  • Online child molesters are generally not pedophiles. (118)Online child molesters are rarely violent. (119)
  • Child pornography production is also an aspect of Internet-initiated sex crimes. One in five online child molesters in the N-JOV Study took sexually suggestive or explicit photographs of victims or convinced victims to take such photographs of themselves or friends. (120)
  • Youths may be more willing to talk extensively and about more intimate matters with adults online than in face-to-face environments. (121
  • it may not be clear to many adolescents and adults that relationships between adults and underage adolescents are criminal. (122)
  • Simply urging parents and guardians to control, watch, or educate their children may not be effective in many situations. The adolescents who tend to be the victims of Internet-initiated sex crimes many not themselves be very receptive to the advice and supervision of parents. (122)
  • We recommend educating youths frankly about the dynamics of Internet-initiated and other nonforcible sex crimes. Youths need candid, direct discussions about seduction and how some adults deliberately evoke and then exploit the compelling feelings that sexual arousal can induce. (122)
    • anonymous
       
      Let's remember that although there are direct references to gay and male pedophiles of gay boys, that 99% of child sex offenders identify as heterosexual, online or offline.
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
  •  
    This research article has the facts about sexual predatory behavior.
Anne Bubnic

Learning Cyberlaw in Cyberspace - 0 views

  •  
    This site provides reading materials for students studying the law as it applies to activities in cyberspace. The reading materials include edited cases, statutes, treaties, and law review articles, as well as content written by the individual module authors. Some have likened the study of cyberspace law to trying to board a moving bus. Given the pace of change in this field any attempt at a traditional casebook would largely be outdated before it reached the hands of the students. This site is designed to take advantage of the hypertext media offered by the world wide web by providing reading modules that can be altered or replaced as the law changes.
Anne Bubnic

ChatRoulette: Devil Incarnate or Accessible Public? - 1 views

  • Don't get me wrong: There is a high probability that you will run into the seedier side of the site in a matter of moments.  Some have argued that ~10% of the site's users are exposing themselves or their genitals through the site.  And, unlike pornographic spam, these exhibitionists are typically male.  
  •  
    It's easy to see new Internet phenomena and panic, especially when the technology in question opens up a portal to all of the weird parts of the Internet. This is precisely what is happening around ChatRoulette, a new peer-to-peer webcam-based video chat site. Although the site was built by a 17-year-old Russian high school student to connect with other teens, nearly every adult who has visited the site runs screaming that this is a terrible space for young people. In some senses, they're right. But the more that they panic and talk about how bad this is for teens, the more teens get curious and want to check it out. The result? A phenomenon generated through fear.
1 - 20 of 821 Next › Last »
Showing 20 items per page