Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items matching "e-mail" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Anne Bubnic

Principal to parents: Take kids off Facebook [Video] - 4 views

  •  
    Anthony Orsini sent an e-mail blast to the Benjamin Franklin Middle School community in Ridgewood, New Jersey, on Wednesday, urging parents to take down their children's online profiles on Facebook and elsewhere. "There is absolutely no reason for any middle school student to be a part of a social networking site!," he wrote. "Let me repeat that - there is absolutely, positively no reason for any middle school student to be a part of a social networking site!" The main problem, he wrote, is that tweens do not have the resilience to withstand internet name-calling. "They are simply not psychologically ready for the damage that one mean person online can cause," he said.
Anne Bubnic

Digital Citizenship: Monitoring Technology Use & Abuse [pdf] - 0 views

  •  
    THE JOURNAL (arcticle) by Mike Ribble and Gerald Bailey. Provides a five-step program for creating a digital citizenship program in your school.Over the last two years, it has become evident that a behavior pattern of misuse and abuse with respect to technology is \nbeginning to emerge in our society. This outbreak of \ntechnology misuse and abuse is documented in continual news \ncoverage on TV, in newspapers and on the Internet - both \ninside and outside of schools. The endless list of misuse and \nabuse includes hacking into school servers, using e-mail to \nintimidate or threaten students, illegally downloading music, \nplagiarizing information from the Internet, using cellular \nphones during class time, accessing pornographic Web sites, \nand playing video games during class. Therefore, if you are \nusing technology in your district, you must begin to deal with \ndigital citizenship in a significant way. \n
buyglobalshop

Buy Verified LiLi Accounts - Buy Global Shop - 0 views

  •  
    Have you listened almost LiLi accounts and pondered what they are all almost? Well, you're not alone! LiLi accounts, brief for Constrained Risk Venture accounts, are a sort of speculation item that offers a special combination of development potential and resource security for financial specialists. These accounts give a layer of assurance for financial specialists by constraining their risk in the case of monetary misfortunes, making them a well known choice among those looking to oversee chance whereas still looking for openings for development in their venture portfolios. Buy Verified LiLi Accounts What precisely is a LiLi account? Have you ever listened of a LiLi account and pondered what precisely it is? In today's advanced keeping money world, there are bounty of modern account choices accessible, and LiLi is one of them. A LiLi account, brief for "life-living," is a sort of money related item outlined to offer assistance people consistently oversee their cash and accomplish their individual money related objectives. But what sets a LiLi account separated from conventional checking or investment funds accounts? Let's take a closer see at what makes a LiLi account one of a kind and how it might advantage your monetary wellness. Buy Verified LiLi Accounts Unlike conventional accounts, a LiLi account ordinarily offers a combination of managing an account administrations and money related apparatuses all in one put. With a LiLi account, you can effectively track your investing, set reserve funds objectives, and indeed gain rewards for assembly certain money related turning points. Furthermore, a few LiLi accounts may offer competitive intrigued rates, permitting your cash to develop over time. Whether you're looking to spare for a enormous buy or fair need to way better oversee your day-to-day accounts, a LiLi account may be a profitable device in making a difference you reach your money related objectives. Remain tuned to learn more approximately th
Anne Bubnic

America's Libraries adapted to digital age - 0 views

  • As a group, libraries have embraced the digital age," said Lee Rainie, founding director of the Pew Internet & American Life Project, which has surveyed public attitudes toward libraries. "They've added collections, added software and hardware, upgraded the skills of their staff. A lot of institutions have had to change in the Internet age, but libraries still have a very robust and large constituency." A December 2007 Pew survey found that more than half of Americans — 53% — visited a library in the past year. That's expected to grow as more people look for free resources and entertainment in a slowing economy.
  • At the one-room Watha T. Daniel/Shaw Interim Library in the District of Columbia, books still line the shelves. But on one recent day, almost every adult at the library sat in front of a computer, surfing the Web, checking e-mail or visiting a social networking site.
  • The analysis found that libraries are thriving in the Internet age: •Attendance increased roughly 10% between 2002 and 2006 to about 1.3 billion. Regionally, Southern states lag the rest of the country in visits per capita. •Circulation, which measures how often library visitors check out print or electronic materials, increased about 9%, from 1.66 billion to 1.81 billion during the five-year period.
  • ...2 more annotations...
  • •The number of Internet-capable computers soared 39% — from about 137,000 in 2002 to nearly 190,000 in 2006. Libraries in rural states in New England and the Midwest led the country in public computers per capita in 2006. The increase in Internet access is thanks in part to the Bill & Melinda Gates Foundation, which launched a national program in 1997 to bring the Internet to libraries, beginning with the South. By 2003, the foundation had spent $250 million on some 47,000 computers, as well as training and tech support, bringing almost every public library online, said Jill Nishi, deputy director of the foundation's U.S. Libraries initiative. "You should be able to walk into any library and find Internet service," she said. "It's free, unfettered access to information."
  • Free Internet access is particularly important for low-income people, said Ken Flamm, an economics professor at the University of Texas at Austin who has studied the role of the Internet in public libraries. Only about a third of households with incomes below $25,000 have Internet access, according to federal data.
  •  
    The Internet was supposed to send America's public libraries the way of eight-track tapes and pay phones. But it turns out, they're busier than ever. Libraries have transformed themselves from staid, sleepy institutions into hip community centers offering
Anne Bubnic

You Have to Be a Parent Online Too - 0 views

  • "When we were kids, our parents always told us not to talk to strangers. That was drilled into our heads," he said. "But now, we have to factor in what happens on the Internet."
  • Security settings and parental involvement are especially important in the virtual world, Morris urged. "Check your child's e- mail account on a regular basis. You're the parent; you can do that."
  • While social networking sites like Facebook, Myspace and Xanga can be hot-spots for sexual predators, "not everything about these sites is bad," Morris said, noting some of the most up-to-date information after the NIU shootings was found on Facebook. "Good things do occur, but we need to make sure we're monitoring them," he said. Morris urged the group to keep home computers in plain sight, to outline their expectations and review communications regularly with their children. "We want to build that level of communication with their kids," he said. "If they're talking to someone they shouldn't, we want them to be able to come to us. A child should be able to listen to a parent more than a predator."
  •  
    Parents today have responsibilities in both the real world and the virtual world, Kane County Regional Office of Education Director Phil Morris told the Elgin Academy community Tuesday.
Anne Bubnic

No bullies allowed [Pennsylvania State Initiative] - 0 views

  • A school must have a written bullying policy that includes consequences for violations, identify school personnel to notify with complaints and the policy must be posted in every classroom and be reviewed by students, according to a press release issued by Williams' office.
  • And while school violence had declined 4 percent during the past several years, bullying in schools has risen 5 percent, according to the U.S. Department of Education.
  • The new legislation applies to any threats or intimidation in a school setting, including on school grounds, on a school bus or at any school-sponsored event. Also, the measure covers threats sent via e-mail or over the Internet, called cyber bullying. According to the state Department of Education, every school day 160,000 students miss school because they are afraid of being bullied.
  • ...1 more annotation...
  • The anti-bully measure was included in a larger School Code bill in 2008. Greenleaf said he proposed the measure back in 2002, but met with resistance from school districts who worried about the cost of implementing such a program.
  •  
    A bill passed earlier this year makes it mandatory for Pennsylvania school districts to have a written anti-bullying policy in place beginning next year.
Anne Bubnic

Cyber Bullying Presents a Complex Legal Landscape - 0 views

  • Cyber bullying conducted at school allows school authorities to more easily impose discipline. The use of school equipment to cyber bully also makes a stronger legal argument for action by the school. And if the student e-mails offensive speech to school or downloads it at school and then distributes it, the school is in an advantageous position regarding disciplining the student. However, speech created at home—such as the creation of a Web site—affords greater legal protection for cyber bullies.
  • “The problem with the approach that web speech created at home can—if accessed at school—become school speech that can be regulated is the very nature of the Internet. Once something is created and placed on the Internet, the author loses control over who can access the speech and where it can be accessed.”
  •  
    As students across the country return to school, school districts face an often complicated and confusing legal landscape on how to deal with cyber bullies in their schools, according to Todd DeMitchell, EdD, a professor of education, who studies school liability, adequate supervision, and responses to preventing bullying and cyber bullying from school administrators and state legislatures.
Anne Bubnic

Humiliation and gossip are weapons of the cyberbully - 0 views

  • ead teachers are being advised to draw up new rules on mobile phone use amid a growing number of cases of what is now known as “cyber-bullying”. In many secondary schools, over 90% of bullying cases are through text messages or internet chatrooms. It is hoped that the rules about mobile phone use will protect children from abusive texts, stop phones going off in class and prevent mobiles being taken into exam halls.
  • Although the majority of kids who are harassed online aren’t physically bothered in person, the cyber-bully still takes a heavy emotional toll on his or her victims. Kids who are targeted online are more likely to get a detention or be suspended, skip school and experience emotional distress, the medical journal reports. Teenagers who receive rude or nasty comments via text messages are six times more likely to say they feel unsafe at school.
  • The problem is that bullying is still perceived by many educators and parents as a problem that involves physical contact. Most enforcement efforts focus on bullying in school classrooms, corridors and toilets. But given that 80% of adolescents use mobile phones or computers, “social interactions have increasingly moved from personal contact at school to virtual contact in the chatroom,'’ write Kirk R. Williams and Nancy G. Guerra, co-authors of one of the journal reports. “Internet bullying has emerged as a new and growing form of social cruelty.'’
  • ...1 more annotation...
  • Cyber-bullying tactics include humiliation, destructive messages, gossip, slander and other “virtual taunts” communicated through e-mail, instant messaging, chatrooms and blogs. The problem, of course, is what to do about it. While most schools do not allow pupils to use their mobiles in the school building, an outright ban is deemed unworkable. Advances in technology are throwing up new problems for teachers to deal with. Children use their phones to listen to music, tell the time or as a calculator. Cyber-bullies sometimes disclose victims' personal data on websites or forums, or may even attempt to assume the identity of their victim for the purpose of publishing material in their name that defames them or exposes them to ridicule.
  •  
    As more and more people have access to computers and mobile phones, a new risk to youngsters has begun to emerge. Electronic aggression, in the form of threatening text messages and the spread of online rumours on social networking sites, is a growing concern.
Anne Bubnic

Social Networking Gets Schooled - 0 views

  • As a whole, the education industry is usually relatively slow to integrate technology into the classroom. In lots of schools nationwide, unbridled access to computers and the Internet is still the exception rather than the rule.
  • The moment students get outside of the classroom, on the other hand, social networking is almost a daily ritual.
  • Dedicated commercial Web 2.0 products and social networking applications are still too new and too rich for typical school leaders to afford. So third-party providers are more likely to offer technology services to students and their schools to expand their horizons in ways never before possible. For example, some school districts are going beyond e-mail technology and using collaboration software and online services to share information, host Web conferences and assign tasks and projects.
  • ...1 more annotation...
  • "Teachers are famous for relying on other teachers for the best ideas about what's working and what's not working. For that reason, as new teachers (read younger, tech-savvy, "Generation Network" college grads) enter the system, they are leveraging education-focused social networks to connect with other teachers, find content contributed by teachers and make sure that they are wringing every ounce of 'network effect' technology from the Internet."
  •  
    To today's students, online social networking is almost second nature outside of the classroom. What about inside the classroom? Educational software and services are taking a cue from Facebook and MySpace, adding a twist of online collaboration and interaction that brings students, teachers and parents together.
Anne Bubnic

Kids online? Cox Survey: Contact with strangers is not unusual. - 0 views

  • One in 10 of these preteenagers has responded to and chatted online with strangers, according to the Tween Internet Safety Survey, sponsored by Cox Communications and the National Center for Missing and Exploited Children.
  • 90 percent of American kids have used the Internet by age 9 and more than a third of 11- and 12-year-olds have a profile on social-network sites such as MySpace and Facebook.
  • Of the tweens with social-network profiles, 61 percent post personal photos online, 48 percent admit to posting a fake age online and 51 percent have received messages from people they didn't know.
  • ...2 more annotations...
  • The survey showed tweens' online presence doubles or even triples among 8- to 10-year-olds and 11- and 12-year-olds: The 42 percent of children 8 to 10 with personal e-mail accounts increases to 71 percent for those 11 and 12, for instance, and 41 percent of 11- and 12-year-olds have an instant-messaging screen name, compared with 15 percent for kids 8 to 10.
  • Half of the 11- and 12-year-olds have their own cell phones -- used for text messaging and taking and transmitting digital photos as well as for traditional calling -- while 19 percent of those 8 to 10 have their own cell phones.
  •  
    One in five of the nation's wired "tweens" -- kids ages 8 to 12 -- has posted personal information on the Internet, and more than a fourth have been contacted online by strangers, a poll released Tuesday found.
Anne Bubnic

Messaging Shakespeare | Classroom Examples | - 0 views

  • Brown's class was discussing some of the whaling calculations in Moby Dick. When one student asked a question involving a complex computation, three students quickly pulled out their cell phones and did the math. Brown was surprised to learn that most cell phones have a built-in calculator. She was even more surprised at how literate her students were with the many functions included in their phones. She took a quick poll and found that all her students either had a cell phone or easy access to one. In fact, students became genuinely engaged in a class discussion about phone features. This got Brown thinking about how she might incorporate this technology into learning activities.
  • Brown noticed that many students used text messaging to communicate, and considered how she might use cell phones in summarizing and analyzing text to help her students better understand Richard III. Effective summarizing is one of the most powerful skills students can cultivate. It provides students with tools for identifying the most important aspects of what they are learning, especially when teachers use a frame of reference (Marzano, Pickering, & Pollock, 2001). Summarizing helps students identify critical information. Research shows gains in reading comprehension when students learn how to incorporate isummary framesi (series of questions designed to highlight critical passages) as a tool for summarizing (Meyer & Freedle, 1984). When students use this strategy, they are better able to understand what they are reading, identify key information, and provide a summary that helps them retain the information (Armbruster, Anderson, & Ostertag, 1987).
  • Text messaging is a real-world example of summarizing—to communicate information in a few words the user must identify key ideas. Brown saw that she could use a technique students had already mastered, within the context of literature study.
  • ...2 more annotations...
  • To manage the learning project, Brown asked a tech-savvy colleague to help her build a simple weblog. Once it was set up, it took Brown and her students 10 minutes in the school's computer lab to learn how to post entries. The weblog was intentionally basic. The only entries were selected passages from text of Richard III and Brown's six narrative-framing questions. Her questions deliberately focused students' attention on key passages. If students could understand these passages well enough to summarize them, Brown knew that their comprehension of the play would increase.
  • Brown told students to use their phones or e-mail to send text messages to fellow group members of their responses to the first six questions of the narrative frame. Once this was completed, groups met to discuss the seventh question, regarding the resolution for each section of the text. Brown told them to post this group answer on the weblog.
  •  
    Summarizing complex texts using cell phones increases understanding.
Vicki Davis

Susan Silverman's Lucky Ladybugs project going on for elementary - 0 views

  • A Collaborative Internet Project for K-5 Students
  • Essential Question: Why are ladybugs considered to be good luck?
  • This project will demonstrate lesson plans designed following principles of Universal Design for Learning (UDL) and examples of student work resulting from the lessons.  As teachers we should ask ourselves if there are any barriers to our students’ learning.  We should look for ways to present information and assess learning in non-text-based formats. 
  • ...5 more annotations...
  • Based on brain research and new media, the UDL framework proposes that educators design lessons with three basic kinds of flexibility: 1. Multiple formats and media are used to present information.
  • Examples: Illustrations, pictures, diagrams, video or audio clips, and descriptions 2.   Teachers use multiple strategies to engage and motivate students. 3.   Students demonstrate learning through multiple performance and product formats.
  • UDL calls for three goals to consider in designing lessons: 1.  Recognition goals: these focus on specific content that ask a student to identify who, what, where, and when. 2.  Strategic goals: these focus on a specific process or medium that asks a student to learn how to do something using problem solving and critical think skills. 3. Affective goals: these focus on a particular value or emotional outcome. Do students enjoy, and appreciate learning about the topic? Does it connect to prior knowledge and experience? Are students allowed to select and discover new knowledge?
  • Resources you might want to use: Scholastic Keys, Kid Pix, Inspiration and Kidspiration, digital camera (still and video), recording narration/music, United Streaming.  Let your imagination go!
  • This project begins on March 15, 2007.  Materials need to be e-mailed by May 31, 2008.
  •  
    An excellent project for elementary students to connect with other classes.
  •  
    A great way to get started with technology is to join in an exciting project. this project by Susan Silverman was designed using the principles of Universal Design for Learning. I've heard her present and she is a pro. (Along with my friend Jennifer Wagner.)
Anne Bubnic

Sociologist Finds That Students Aren't So Web-Wise After All - 0 views

  •  
    [April 08, Journal of Higher Education]
    An assistant professor in Northwestern University's sociology department, has discovered that students aren't nearly as Web-savvy as they, or their elders, assume. Ms. Hargittai studies the technological fluency of college freshmen. She found that they lack a basic understanding of such terms as BCC (blind copy on e-mail), podcasting, and phishing. This spring she will start a national poster-and-video contest to promote Web-related skills.
Anne Bubnic

How To Stop Cyber-Bullying - 0 views

  • Yet with so many different types of cyberbullying, ranging from online impersonation to e-mail hacking and distributing embarrassing materials about a person, it can be difficult for kids, let alone those trying to help them, to know how to respond and stop the 21st century bully in his or her tracks. "Awareness about the issue is high, but awareness about what to do when it happens is mixed," says Michele Ybarra, president and research director for Internet Solutions for Kids (ISK) and an adjunct faculty member at Johns Hopkins School of Public Health.
  • Research suggests that those on the receiving end of traditional bullying may be more likely to cyberbully as a form of retaliation. Kids involved in the more severe instances of cyberbullying also tend to have more psychosocial problems, exhibiting aggression, getting in trouble at school and having poor relationships with their parents, says Nancy Willard, an expert on cyberbullying and author of Cyberbullying and Cyberthreats. And while traditional bullying appears to peak in middle school and drop off as kids reach high school, cyberbullying tends to slightly increase among kids in high school, a trend researchers can't yet explain.
  • One of the tricky things about helping cyberbullying targets is that they aren't always willing to talk about the problem. Teens often cite a fear of having their Internet privileges revoked as a reason for keeping quiet, Agatston says. Kids who receive threatening messages in school may not divulge what's happened for fear of getting in trouble, since many schools ban use of cellphones during the day. To get around that problem, Willard recommends having a frank discussion with your children about cyberbullying before it happens.
  • ...1 more annotation...
  • Research is also beginning to show that just like traditional forms of bullying, cyberbullying can lead to anxiety, lower rates of self-esteem and higher rates of school absence, says Patti Agatston, a licensed professional counselor with the Prevention/Intervention Center, a student assistance program serving more than 100 schools in suburban Atlanta, Ga.
  •  
    Kids can be mean.\n\nIt's a fact of life we've all experienced. Gone are the days, however, when avoiding a bully meant ducking out of the back door at school. Thanks to personal computers, cellphones and instant messaging, it's now easier than ever for children to attack each other, often anonymously.
Judy Echeandia

Teaching Teenagers About Harassment - 0 views

  • About 20 percent of teenagers have posted or sent nude cellphone pictures of themselves, according to the National Campaign to Prevent Teen and Unplanned Pregnancy, a nonprofit group.
  • digital dating violence.
  • The behaviors can be a warning sign that a teenager may become a perpetrator or a victim of domestic violence, according to the group.
  • ...6 more annotations...
  • teenagers frequently received digital threats or upsetting requests from people they were dating. But the teenagers were not talking about it, did not know how to handle it and did not know what was appropriate and what was not.
  • “It was abuse that there was no protocol around,” Mr. Law said. The parents were not aware of the interactions, and the teenagers did not know how to prevent it, he said.
  • The campaign and its Web site, ThatsNotCool.com, encourage teenagers to set their own boundaries. It is intended to appeal to all teenagers, not just those with serious problems. “The kids don’t want to be told what’s right and what’s wrong,” Mr. Law said. On the site, teenagers can send one of 35 “callout cards” — brightly colored messages they can send by e-mail, post to their Facebook or MySpace accounts or download — that are meant to tell someone they have crossed a line. The messages are sharp. For example: “Congrats! With that last text, you’ve achieved stalker status.”
  • The site offers an area where teenagers can seek advice, like how to stop a boyfriend from nonstop text-messaging. For more direct advice, the site tells teenagers to call or conduct a live chat with trained volunteers.
  • The campaign is digitally focused, reflecting the way teenagers communicate. Even the posters that will appear in schools, which display some of the “callout card” messages, ask viewers to snap a photo with their cellphone and text-message it to someone.
  • All of the communications are aimed at teenagers, not parents. Ms. Soler said the fund was working on a campaign to alert parents to problems, but for now, she wanted to get teenagers discussing them.“We want to give them the tools to say ‘You can have a healthy relationship, and here’s the road map,’ ” Ms. Soler said.
  •  
    A New Ad Warns About Abusive Texting\nA new public service ad highlights the growing problems of "textual abuse," where harassment of children occurs by way of text messages.
Anne Bubnic

How Privacy Vanishes Online, a Bit at a Time - 1 views

  •  
    If a stranger came up to you on the street, would you give him your name, Social Security number and e-mail address? Probably not. Yet people often dole out all kinds of personal information on the Internet that allows such identifying data to be deduced.
Anne Bubnic

Policies Target Teacher-Student Cyber Talk - 1 views

  • The motivation for the bill was growing problems with [interactions] that started relatively innocently and escalated from there,” sa
  •  
    A new state lawRequires Adobe Acrobat Reader requires all Louisiana districts to implement policies requiring documentation of every electronic interaction between teachers and students through a nonschool-issued device, such as a personal cellphone or e-mail account, by Nov.15. Parents also have the option of forbidding any communication between teachers and their child through personal electronic devices.
JOSEPH SAVIRIMUTHU

Facebook case helps fight cybercrime - 0 views

  • School resource officers from across Alabama and the nation fielded complaints about an Internet extortionist badgering girls for nude pic­tures. Victims even created a Facebook page warning fe­males not to talk to the per­son with the username Meta­scape. Metascape turned out to be Jonathan Vance, an Alabama man who made lewd cyber re­quests of 206 girls and young women and attempted to hack into and gain control of their e-mail, Facebook and MySpace accounts, federal authorities say. He was suc­cessful in at least 53 cases.
  •  
    School resource officers from across Alabama and the nation fielded complaints about an Internet extortionist badgering girls for nude pictures. Victims even created a Facebook page warning females not to talk to the person with the user name Metascape.
Anne Bubnic

E-Mail Alert! [Archiving Mandates] - 0 views

  •  
    Revised federal archiving rules raise legal, logistical challenges.
dmschool

Digital marketing course training in Hyderabad|Online marketing training in hyderabad|internet marketing training - 0 views

  •  
    Our Digital Marketing Training Program in Hyderabad is conducted by professionals who were in the Online Marketing Industry since 2008 and Enhance your career in Digital marketing by taking the advantage of the fastest growing Internent and web Marketing Industry
« First ‹ Previous 41 - 60 of 63 Next ›
Showing 20 items per page