Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Contents contributed and discussions participated by Vicki Davis

Contents contributed and discussions participated by Vicki Davis

Vicki Davis

A Bloggers' Code of Ethics - CyberJournalist.net - Online News Association - Ethics and... - 5 views

  •  
    If you are a blogger, you should have ethics. Fully disclose. I've had someone ask to pay me to insert their link into a blog post I wrote. NO! Ethical disclosure means that if I do anything or am affiliated with ANYTHING that I will fully disclose it, period. Does it mean that less people may click on my Amazon links if I say I'm an affiliate - yes. However, my first debt is the content of my blog and the integrity of what you'll find here on Cool Cat Teacher. It is what I think without any influence of any kind unless it is fully disclosed. If you don't know what I'm talking about, take a look on this link.
Vicki Davis

Digiteen - Group | Diigo - 1 views

  •  
    Digiteen Diigo group that we use with our students on the digital citizenship project. The 9 aspects of digital citizenship correspond with the 9 aspects from Mike Ribble and Gerald Bailey's Digital Citizenship in schools.
Vicki Davis

Iditarod-Collaborative-Project » home - 0 views

  • Iditarod Collaborative Project.
  •  
    elementary classrooms connecting from USA, Canada, and Lebanon via a wiki project.
  •  
    Elementary classrooms connecting about the Iditarod. From USA, Canada, and Lebanon. They will be re-running this project again next year.
Vicki Davis

facilitatortips » Online Surveys and Forms - 0 views

  •  
    Teaching students how to use online surveys and aggregate results is an important skill as part of authentic research. This wiki page has excellent information on how to use these tools.
  •  
    Incredible wiki page about online surveys and forms. I highly recommend that we begin to have our students conduct surveys as part of authentic research. This is an excellent page about this topic. (The rest of the wiki is nice as well.)
Vicki Davis

The Connected Classroom » home - 1 views

  •  
    Kristin Hokanson's wiki showing how classrooms can connect.
  •  
    Kristin Hokanson's excellent wiki with many Web 2.0 resources. Excellent site!
  •  
    Excellent wiki full of resources from Kristin Hokanson. Wow!
Vicki Davis

The Web2.0 Prophecy: An Adventure | - 0 views

  •  
    Excellent overview of Web 2.0, what it is and how it works.
  •  
    This is an excellent article that has been reposted. It includes a lot of the information that outlines WHAT web 2.0 is. This includes videos and many important hyperlinks. Excellent article for newcomers to web 2.0 to pick up on.
Vicki Davis

Susan Silverman's Lucky Ladybugs project going on for elementary - 0 views

  • A Collaborative Internet Project for K-5 Students
  • Essential Question: Why are ladybugs considered to be good luck?
  • This project will demonstrate lesson plans designed following principles of Universal Design for Learning (UDL) and examples of student work resulting from the lessons.  As teachers we should ask ourselves if there are any barriers to our students’ learning.  We should look for ways to present information and assess learning in non-text-based formats. 
  • ...5 more annotations...
  • Based on brain research and new media, the UDL framework proposes that educators design lessons with three basic kinds of flexibility: 1. Multiple formats and media are used to present information.
  • Examples: Illustrations, pictures, diagrams, video or audio clips, and descriptions 2.   Teachers use multiple strategies to engage and motivate students. 3.   Students demonstrate learning through multiple performance and product formats.
  • UDL calls for three goals to consider in designing lessons: 1.  Recognition goals: these focus on specific content that ask a student to identify who, what, where, and when. 2.  Strategic goals: these focus on a specific process or medium that asks a student to learn how to do something using problem solving and critical think skills. 3. Affective goals: these focus on a particular value or emotional outcome. Do students enjoy, and appreciate learning about the topic? Does it connect to prior knowledge and experience? Are students allowed to select and discover new knowledge?
  • Resources you might want to use: Scholastic Keys, Kid Pix, Inspiration and Kidspiration, digital camera (still and video), recording narration/music, United Streaming.  Let your imagination go!
  • This project begins on March 15, 2007.  Materials need to be e-mailed by May 31, 2008.
  •  
    An excellent project for elementary students to connect with other classes.
  •  
    A great way to get started with technology is to join in an exciting project. this project by Susan Silverman was designed using the principles of Universal Design for Learning. I've heard her present and she is a pro. (Along with my friend Jennifer Wagner.)
Vicki Davis

Online Predators and Their Victims - 0 views

  • My (Liz B. Davis ) Summary of Key Points (All are quotes directly from the article): Online "Predators" and Their Victims. Myths, Realities, and Implications for Prevention and Treatment. by: Janis Wolak, David Finkelhor, and Kimberly J. Mitchell - University of New Hampshire and Michele L. Ybarra - Internet Solutions for Kids, Inc.
  • The publicity about online"predators" who prey on naive children using trickery and violence is largely inaccurate.
  • adult offenders who meet, develop relationships with, and openly seduce underage teenagers
  • ...20 more annotations...
  • In the great majority of cases, victims are aware they are conversing online with adults. In the N-JOV Study, only 5% of offenders pretended to be teens when they met potential victims online. (112)
  • Offenders rarely deceive victims about their sexual interests.
  • promises of love and romance
  • 99% of victims of Internet-initiated sex crimes in the N-JOV Study were 13 to 17 years old, and none were younger than 12. 48% were 13 or 14 years old. (115)
  • it was those 15-17 years of age who were most prone to take risks involving privacy and contact with unknown people. (115)
  • take place in isolation and secrecy, outside of oversight by peers, family  members, and others in the youth's face-to-face social networks (115)
  • Most of the online child molesters described in the N-JOV Study met their victims in chatrooms. In a 2006 study, about one third of youths who received online sexual solicitation had received them in chatrooms. (116)
  • Youth internet users with histories of offline sexual or physical abuse appear to be considerably more likely to receive online aggressive sexual solicitations. (117)
  • ..Although Internet safety advocates worry that posting personal information exposes youths to online molesters, we have not found empirical evidence that supports this concern. It is interactive behaviors, such as conversing online with unknown people about sex, that more clearly create risk. (117)
  • Online molesters do not appear to be stalking unsuspecting victims but rather continuing to seek youths who are susceptible to seduction. (117)
  • maintaining online blogs or journals, which are similar to social networking sites in that they often include considerable amounts of personal information and pictures, is not related to receiving aggressive sexual solicitation unless youths also interact online with unknown people. (117)
  • Boys constitute 25% of victims in Internet-initiated sex crimes, and virtually all of their offenders are male. (118
  • Some gay boys turn to the internet to find answers to questions about sexuality or meet potential romantic partners, and there they may encounter adults who exploit them. (118)
  • ..child molesters are, in reality, a diverse group that cannot be accurately characterized with one-dimensional labels. (118)
  • Online child molesters are generally not pedophiles. (118)Online child molesters are rarely violent. (119)
  • Child pornography production is also an aspect of Internet-initiated sex crimes. One in five online child molesters in the N-JOV Study took sexually suggestive or explicit photographs of victims or convinced victims to take such photographs of themselves or friends. (120)
  • Youths may be more willing to talk extensively and about more intimate matters with adults online than in face-to-face environments. (121
  • it may not be clear to many adolescents and adults that relationships between adults and underage adolescents are criminal. (122)
  • Simply urging parents and guardians to control, watch, or educate their children may not be effective in many situations. The adolescents who tend to be the victims of Internet-initiated sex crimes many not themselves be very receptive to the advice and supervision of parents. (122)
  • We recommend educating youths frankly about the dynamics of Internet-initiated and other nonforcible sex crimes. Youths need candid, direct discussions about seduction and how some adults deliberately evoke and then exploit the compelling feelings that sexual arousal can induce. (122)
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
  •  
    This research article has the facts about sexual predatory behavior.
Vicki Davis

Children Online: Getting Younger and Continuing to Take Risks - 0 views

  • 16% posted personal interests 15% posted information about their physical activities 20% gave out their real name 5% posted information about their school 6% posted their home address 6% posted their phone number 9% posted a photograph of themselves
    • Vicki Davis
       
      Again, education is so important of both students and parents.
  •  
    A 2007-2008 research study conducted by Rochester Institute of Technology (RIT) reported several key findings that indicate children are logging on to the Internet at a very young age. Parental supervision of this computer activity, however, is generally lax. Not surprisingly, the study found that children are communicating with friends, peers, and others online in ways that show a lack of knowledge in what is ethical, safe behavior.
Vicki Davis

Why am I fighting for Social Networking? - 0 views

  •  
    What do you think about the term "social" networking -- I rather like the term "educational" networking.
  •  
    This teacher is fighting for "social" networking -- I left a comment that she instead fight for "educational" networking. I think that the demonization of "social networking" by our media makes this term a death sentence for one's efforts.\n\nRead this post and see what you think.
Vicki Davis

Search and Seizure of Cell Phones: Can You Hear Me Now? - 0 views

  • May school officials lawfully “search” the confiscated cell phone to look at stored text messages, photographs, videos, and logs of incoming and outgoing calls? Clearly, the circumstances of the search must satisfy the T.L.O. standard. Not as clear, however, is whether such a search violates federal or Michigan laws regarding stored electronic communications.
  • [A] search of a student by a teacher or other school officials will be ‘justified at its inception’ when there are reasonable grounds for suspecting that the search will turn up evidence that the student has violated or is violating either the law or the rules of the school. Such a search will be permissible in its scope when the measures adopted are reasonably related to the objectives of the search and not excessively intrusive in light of the age and sex of the student and the nature of the infraction.”
  • In Klump v Nazareth Area Sch Dist, 425 F Supp 2d 622 (ED Pa, 2006), a federal district court denied the school’s motion to dismiss a lawsuit filed by a student whose cell phone was searched.
  • ...5 more annotations...
  • compensatory and punitive damages for the alleged unconstitutional search, violation of the Pennsylvania Wiretapping and Electronic Surveillance Control Act, invasion of privacy, and defamation.
  • The court ruled that the student had stated a claim for the alleged violation of his right to be free from an unreasonable search.
  • here was no basis for them to search the text and voice mail messages stored on the phone.
  • unlawful access to the stored voice mail and text message communications.
  • (2) A person shall not willfully and maliciously read or copy any message from any telegraph, telephone line, wire, cable, computer network, computer program, or computer system, or telephone or other electronic medium of communication that the person accessed without authorization. (3) A person shall not willfully and maliciously make unauthorized use of any electronic medium of communication, including the internet or a computer, computer program, computer system, or computer network, or telephone.
  •  
    Confiscating and looking at information on cell phones by school officials is still not clear. This is a very interesting case study for those working with digital citizenship issues at their school.
  •  
    Fascinating article explaining Michigan take on searching and confiscating cell phones.
Vicki Davis

Policies and procedures: Department of Education and Training - 0 views

  •  
    New South Wales Education and Training Policies from Australia.
Vicki Davis

openpd » home - 0 views

  •  
    We should talk to Darren and perhaps join in with some things he is doing with open PD. This is a great opportunity for organizations to learn more about the newest technologies.
  •  
    Open professional development by Darren Draper and Friends. These opportunities will let you open up your classroom and join in with others to learn collaboratively about blogs, wikis, and more. Take a look at it.
Vicki Davis

Think.com - Safety and Netiquette Lesson - 0 views

  • Identify and provide examples of proper and improper netiquette; Generate a list of preferred web behaviors for their class; Understand and use a few Think.com content creation tools; Define "safety" and describe/draw an environment that values safety; Develop a greater sense of personal responsibility and web community; and Define the following words: accountable, community, enforcement, environment, etiquette, inappropriate, law, netiquette, private, responsible, rule, safety.
  •  
    Think.com's safety lesson with nets standards. Think.com is excellent to use with younger students and is very walled and has an excellent profanity filter. I highly recommend it and have personally used it for a summer blogging project. Excellent site. It also requires an extensive verification process by the participating schools.
  •  
    Excellent lesson plan and activities from think.com for teaching digital citizenship, particularly safety and netiquette.
Vicki Davis

Internet Safety - 0 views

  •  
    Internet Safety site that has won some awards -- I want to know the balance of this information and if it shows all aspects of the issue. I would love to have someone do a full review on this one.
  •  
    This site is full of information about the scary side of the Internet -- it talks about predators and what they look like. It also shows predator warning signs, which could be interesting. I'm curious to see if there is balance and where their facts come from. This is targeted to age 10 and up. There are games and other things in here. I'd like to know some people who have been through this material. It won an award in 2007
Vicki Davis

FRONTLINE: growing up online: readings and links | PBS - 0 views

  •  
    These go with the growing up online series.
  •  
    Bookmarks from the growing up online series for parents. These are links to the major websites for online safety.
Vicki Davis

Web Etiquette and Safety Lesson Plan [Assessment Piece] - 0 views

  • A person is on the other end of all web communication. The web connects people in a community where everyone becomes each other's neighbor. It is just as important to observe safety on the Internet as it is to follow traffic signs. The Think.com community is a place where the teacher sees everything. Everyone is responsible for his/her own actions while in Think.com. Passwords are to be kept secret.
    • Vicki Davis
       
      Excellent concluding concepts for an introductory course for young students. How many don't understand this!
  •  
    Appropriate web etiquette (netiquette) and web safety are vital for building a strong web community. This is a lesson plan that teachers can use to introduce key concepts to their students as they introduce them to the Think.com community. Use this model lesson as designed, change it to fit your needs, or create your own.
Vicki Davis

Technology in the Middle » Blog Archive » 1:1-Digital Citizenship - 1 views

  •  
    Excellent post discussing the elements of digital citizenship.
  •  
    Excellent blog post about the elements of digital citizenship from an educator. This makes a case about what should be done and how.
Vicki Davis

Michel Foucault, Privacy, and Doubts about Web 2.0 - 0 views

  •  
    Excellent post about how many are relinquishing their privacy. Very insightful post.
  •  
    Fascinating ponderings by Mike Curtain about how many of us are relinquishing our own privacy. This is a very thought provoking post and yet another one I wouldn't have read, had he not linked to my blog post yesterday asking for bloggers to share their links. This is a very powerful blog post. Wow! I personally think there is a balance here, but also agree than many are not considering the privacy they are relinquishing when they post things that don't belong out there for everyone to see. Internet privacy is an illusion, it really is.
Vicki Davis

Online Activities Have Offline Consequences - 0 views

  •  
    Great post by Alfred Thompson, "the" microsoft education blogger. I think he hits the nail on the head with this one. Great post!
  •  
    Great post about how online activities should have offline consequences by Alfred Thompson.
1 - 20 of 62 Next › Last »
Showing 20 items per page