Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items matching "reference" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
syukron nuryadi

SAMSUNG GALAXY CENTU - 0 views

image

samsung manual galaxy

started by syukron nuryadi on 19 Apr 14 no follow-up yet
Anne Bubnic

Researchers help define next-gen social networking - 0 views

  • The researchers also discussed opinions, some of them perhaps surprising, on other notable subjects in the online social-networking space. Lawley, who has a 14-year-old son, said she is strongly against some of the restrictive methods used online to segregate adults from children in an attempt to protect kids from predators. On Second Life, for example, she can't interact with her son because he has to be in the teen grid and she has to be in the adult grid.
  • "So I don't learn from him about how to use technologies, and he doesn't learn from me about how to interact in a social context," she said. Shutting down sites or trying to shut out people won't solve the problem of sexual predators, she said. "We don't talk about shutting down the Catholic Church," she said, referring to the clergy sex-abuse scandal. "Sexual deviancy isn't unique to the online world."
  •  
    Users need the ability to build small communities, rather than being forced into large ones
Anne Bubnic

Student Bashes Administrators, Gets Disciplined - 0 views

  • According to Doninger, the principal told her that Jamfest was cancelled because of the students’ action. The principal denied saying that. That evening, Doninger posted an entry on her personal blog in which she noted that Jamfest had been cancelled, referred to the district administrators as “douchebags,” and encouraged continued contact with the superintendent to “piss her off more.” The following day the event was rescheduled. Sometime later school officials
  • The appeals court found that it was reasonably foreseeable that Doninger’s posting would reach campus and that the posting created a foreseeable risk of substantial disruption within the school environment because the language used was offensive. It likely disrupted efforts to resolve the controversy, and the posting that Jamfest had been cancelled made it foreseeable that school operations might well be disrupted further.
  • There was no evidence of any disruption at school. The only disruption was to the principal and superintendent in responding to what was an impressive response to the student’s call for complaints. There was no indication in the record that the disruption interfered in any way with the delivery of instruction or in any way impacted student welfare. If administrators are not being appropriately sensitive to the interests of students or are engaging in other actions that cause concern, students clearly should have the free speech right to protest and to call for other students and community members to register their complaints. Inconveniencing school administrators under such circumstances should not be considered to constitute substantial disruption.
  •  
    A court case upholds administrators' rights to discipline a student who used derogatory language on a blog, but questions arise. In Doninger v. Niehoff, the U.S. Court of Appeals for the Second Circuit ruled in May that a Connecticut school district that disciplined a student for vulgar and derogatory remarks made off-campus did not violate her free speech rights.
Anne Bubnic

Terror in the Classroom: What Can be Done?, Part 4 - 0 views

  • A survey conducted by MSN United Kingdom found that 74% of teens as compared to 80% in this study did not go to anyone for advice when they were cyberbullied (www.msn.co.uk/cyberbullying, 2006). One reason some teenagers are reluctant to tell parents or adults is the fear of retaliation.
  • Many times parents don't get involved because they are afraid of invading their teen's privacy. Others may feel that as long as they have filtering software their teen is protected from negative material.
  • Parents need to be educated about cyberbullying- what it looks like, what the effects are and how to handle it. Rosalind Wiseman, educator and author of the best seller "Queen Bees & Wannabes", suggest parents consider the following: Use technology as an opportunity to reinforce your family values. Attach rules and consequences if inappropriate behavior occurs. Move the computer out of your child's bedroom and into the family room. Teach your child not to share passwords. Install monitoring and filtering software. Monitor your child's screen name(s) and Web sites for inappropriate content. If cyberbullying occurs, save and print out any evidence and decide whom you should contact for assistance.
  • ...1 more annotation...
  • n Tinker v. Des Moines Independent Community School District, 393 U.S. 503 (1969). The court ruled that a student's right to free speech can be limited when the speech "materially disrupts class work or involves substantial disorder or invasion of the rights of others." The standard of "material disruption" set by Tinker is often referred to by the courts
  •  
    What Can Parents Do? Schools should start addressing students, parents and staff about the issues of cyberbullying. Students need to be reminded that what they do in cyberspace is not really anonymous. They need to know their behaviors and words are downloadable, printable and sometimes punishable by law. The courts have given some direction for schools dealing with cyberbullying. "School districts are well within their legal rights to intervene in cyberbullying incidents - even if these incidents were initiated off-campus - if it can be demonstrated that the incident resulted in a substantial disruption of the educational environment"
Anne Bubnic

Messaging Shakespeare | Classroom Examples | - 0 views

  • Brown's class was discussing some of the whaling calculations in Moby Dick. When one student asked a question involving a complex computation, three students quickly pulled out their cell phones and did the math. Brown was surprised to learn that most cell phones have a built-in calculator. She was even more surprised at how literate her students were with the many functions included in their phones. She took a quick poll and found that all her students either had a cell phone or easy access to one. In fact, students became genuinely engaged in a class discussion about phone features. This got Brown thinking about how she might incorporate this technology into learning activities.
  • Brown noticed that many students used text messaging to communicate, and considered how she might use cell phones in summarizing and analyzing text to help her students better understand Richard III. Effective summarizing is one of the most powerful skills students can cultivate. It provides students with tools for identifying the most important aspects of what they are learning, especially when teachers use a frame of reference (Marzano, Pickering, & Pollock, 2001). Summarizing helps students identify critical information. Research shows gains in reading comprehension when students learn how to incorporate isummary framesi (series of questions designed to highlight critical passages) as a tool for summarizing (Meyer & Freedle, 1984). When students use this strategy, they are better able to understand what they are reading, identify key information, and provide a summary that helps them retain the information (Armbruster, Anderson, & Ostertag, 1987).
  • Text messaging is a real-world example of summarizing—to communicate information in a few words the user must identify key ideas. Brown saw that she could use a technique students had already mastered, within the context of literature study.
  • ...2 more annotations...
  • To manage the learning project, Brown asked a tech-savvy colleague to help her build a simple weblog. Once it was set up, it took Brown and her students 10 minutes in the school's computer lab to learn how to post entries. The weblog was intentionally basic. The only entries were selected passages from text of Richard III and Brown's six narrative-framing questions. Her questions deliberately focused students' attention on key passages. If students could understand these passages well enough to summarize them, Brown knew that their comprehension of the play would increase.
  • Brown told students to use their phones or e-mail to send text messages to fellow group members of their responses to the first six questions of the narrative frame. Once this was completed, groups met to discuss the seventh question, regarding the resolution for each section of the text. Brown told them to post this group answer on the weblog.
  •  
    Summarizing complex texts using cell phones increases understanding.
anonymous

Online Predators and Their Victims - 0 views

  • My (Liz B. Davis ) Summary of Key Points (All are quotes directly from the article): Online "Predators" and Their Victims. Myths, Realities, and Implications for Prevention and Treatment. by: Janis Wolak, David Finkelhor, and Kimberly J. Mitchell - University of New Hampshire and Michele L. Ybarra - Internet Solutions for Kids, Inc.
  • The publicity about online"predators" who prey on naive children using trickery and violence is largely inaccurate.
  • adult offenders who meet, develop relationships with, and openly seduce underage teenagers
  • ...21 more annotations...
  • In the great majority of cases, victims are aware they are conversing online with adults. In the N-JOV Study, only 5% of offenders pretended to be teens when they met potential victims online. (112)
  • Offenders rarely deceive victims about their sexual interests.
  • promises of love and romance
  • 99% of victims of Internet-initiated sex crimes in the N-JOV Study were 13 to 17 years old, and none were younger than 12. 48% were 13 or 14 years old. (115)
  • it was those 15-17 years of age who were most prone to take risks involving privacy and contact with unknown people. (115)
  • take place in isolation and secrecy, outside of oversight by peers, family  members, and others in the youth's face-to-face social networks (115)
  • Most of the online child molesters described in the N-JOV Study met their victims in chatrooms. In a 2006 study, about one third of youths who received online sexual solicitation had received them in chatrooms. (116)
  • Youth internet users with histories of offline sexual or physical abuse appear to be considerably more likely to receive online aggressive sexual solicitations. (117)
  • ..Although Internet safety advocates worry that posting personal information exposes youths to online molesters, we have not found empirical evidence that supports this concern. It is interactive behaviors, such as conversing online with unknown people about sex, that more clearly create risk. (117)
  • Online molesters do not appear to be stalking unsuspecting victims but rather continuing to seek youths who are susceptible to seduction. (117)
  • maintaining online blogs or journals, which are similar to social networking sites in that they often include considerable amounts of personal information and pictures, is not related to receiving aggressive sexual solicitation unless youths also interact online with unknown people. (117)
  • Boys constitute 25% of victims in Internet-initiated sex crimes, and virtually all of their offenders are male. (118
  • Some gay boys turn to the internet to find answers to questions about sexuality or meet potential romantic partners, and there they may encounter adults who exploit them. (118)
  • ..child molesters are, in reality, a diverse group that cannot be accurately characterized with one-dimensional labels. (118)
  • Online child molesters are generally not pedophiles. (118)Online child molesters are rarely violent. (119)
  • Child pornography production is also an aspect of Internet-initiated sex crimes. One in five online child molesters in the N-JOV Study took sexually suggestive or explicit photographs of victims or convinced victims to take such photographs of themselves or friends. (120)
  • Youths may be more willing to talk extensively and about more intimate matters with adults online than in face-to-face environments. (121
  • it may not be clear to many adolescents and adults that relationships between adults and underage adolescents are criminal. (122)
  • Simply urging parents and guardians to control, watch, or educate their children may not be effective in many situations. The adolescents who tend to be the victims of Internet-initiated sex crimes many not themselves be very receptive to the advice and supervision of parents. (122)
  • We recommend educating youths frankly about the dynamics of Internet-initiated and other nonforcible sex crimes. Youths need candid, direct discussions about seduction and how some adults deliberately evoke and then exploit the compelling feelings that sexual arousal can induce. (122)
    • anonymous
       
      Let's remember that although there are direct references to gay and male pedophiles of gay boys, that 99% of child sex offenders identify as heterosexual, online or offline.
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
  •  
    This research article has the facts about sexual predatory behavior.
Stephanie Anderson

Freeplay Music, Broadcast Production Music Library - 0 views

  •  
    Freeplay Music Library, is a comprehensive collection of High End Broadcast production music spanning all the popular musical genres, available for download either on-line or via Portable Hard Drive
Anne Bubnic

Teaching About the Web Includes Troublesome Parts - 1 views

  • hat blurred line between public and private space is what Common Sense tries to address. “That sense of invulnerability that high school students tend to have, thinking they can control everything, before the Internet there may have been some truth to that,” said Ted Brodheim, chief information officer for the New York City Department of Education. “I don’t think they fully grasp that when they make some of these decisions, it’s not something they can pull back from.” Common Sense bases all its case studies on real life, and insists on the students’ participation. “If you just stand up and deliver a lecture on intellectual property, it has no meaning for the kids,” said Constance M. Yowell, director of education for the John D. and Catherine T. MacArthur Foundation, which has provided financing.
  •  
    When Kevin Jenkins wanted to teach his fourth-grade students at Spangler Elementary here how to use the Internet, he created a site where they could post photographs, drawings and surveys. And they did. But to his dismay, some of his students posted surveys like "Who's the most popular classmate?" and "Who's the best-liked?"
Anne Bubnic

Cyberbullying Discussion Guide for Teachers/Parents - 0 views

  •  
    These materials are intended to be used with parents. After showing the Common Sense Video on cyberbullying tips, this discussion guide can be used with parents. There is also a Cyberbullying Tip Sheet that parents can refer to in the discussion. Provide the Family Media Agreement for parents to \ntake home and discuss with their family.
Anne Bubnic

Texting May Be Taking a Toll on Teenagers - 0 views

  • The phenomenon is beginning to worry physicians and psychologists, who say it is leading to anxiety, distraction in school, falling grades, repetitive stress injury and sleep deprivation.
  • Psychologists expect to see teenagers break free from their parents as they grow into autonomous adults, Professor Turkle went on, “but if technology makes something like staying in touch very, very easy, that’s harder to do; now you have adolescents who are texting their mothers 15 times a day, asking things like, ‘Should I get the red shoes or the blue shoes?’ ”
  •  
    Spurred by the unlimited texting plans offered by carriers like AT&T Mobility and Verizon Wireless, American teenagers sent and received an average of 2,272 text messages per month in the fourth quarter of 2008, according to the Nielsen Company - almost 80 messages a day, more than double the average of a year earlier.
Anne Bubnic

AB 91 - Golden Rule Act [Kentucky] - 0 views

  •  
    In April 2008, Gov. Steve Beshear signed House Bill 91, often referred to as "The Golden Rule Act." The measure is aimed at protecting Kentucky's students by requiring "bullying" policies in the state's public schools. "This legislation hits home for many children, teens and their parents," said Gov. Beshear. "By prohibiting bullying and harassment among students, The Golden Rule Act will help protect Kentucky's most valuable resource, our children."
Anne Bubnic

Snopes.com: Urban Legends Reference Pages - 0 views

  •  
    One of the most comprehensive web sites on the Internet related to Urban Myths and Legends. Whenever I get something even remotely suspicious via email, I always come here first!
Anne Bubnic

Wikimedia Commons - 2 views

  •  
    Media file repository making available public domain and freely-licensed educational media content (images, sound and video clips) to everyone, in their own language.
buyglobalshop

Buy Google AdSense Accounts - Best Quality Everything Google AdSense Accounts 2024 - 0 views

  •  
    Google AdSense is a important tool that has revolutionized the way millions of website possessors induce income online. But what exactly is it? In simple terms, Google AdSense is an advertising program by Google that allows website possessors to display targeted advertisements on their spots and earn plutocrat when callers click on those advertisements. It works by using Google's vast network of advertisers who bid for announcement placements on colorful websites. When someone visits a website with AdSense advertisements, Google's algorithms dissect the content of the runner and display applicable advertisements that are most likely to be of interest to the caller. This way, website possessors can monetize their online presence and advertisers can reach a wider followership, creating a mutually salutary arrangement. Buy Google AdSense Accounts How Does Google AdSense Work? Google AdSense is a extensively popular online advertising program that enables website possessors and generators to monetize their content by displaying targeted advertisements on their platforms. But how does Google AdSense actually work? Let's dive into the details. At its core, Google AdSense works by connecting advertisers and website possessors. Advertisers, who are seeking to promote their products or services, produce advertisements through the Google Advertisements platform. These advertisements also suffer a rigorous review process by Google to insure they meet their guidelines and programs. Buy Google AdSense Accounts Website possessors who wish to induce profit from their online content can subscribe up for an AdSense account through the Google AdSense website. Once approved, they gain access to a unique law grain which they can integrate into their website's HTML. This law enables the AdSense program to automatically display applicable and targeted advertisements to their callers. To determine the applicability of the advertisements displayed, Google AdSense utilizes a com
‹ Previous 21 - 36 of 36
Showing 20 items per page