Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items matching "the" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Anne Bubnic

Facebook, Take 2: Cyberbullying - 0 views

  • I also asked them why they allowed certain girls to be on their friends list when they know that some of them will resort to this type of bullying, and most said because they felt they “had to.” This kind of pressure to allow “friends” on one’s site could also be considered a form of bullying, as they feel there may be consequences to shutting some out regardless of their lack of Internet etiquette.
  • As a public school principal, I can’t legally discipline a student for cyberbullying actions that take place outside of school that don’t result in bodily harm at school. However, when cyberbullying that has taken place outside of school becomes a school issue, as it did today, we must reserve the right to take action if the effects of outside cyberbullying threaten the safety or well-being of the student(s) in school, even if it hasn’t caused bodily harm…yet.
  • School officials have the authority to impose discipline if the speech has, or there are particularized reasons to believe it will cause a substantial disruption at school or interference with the rights of students to be secure. Three types of situations generally meet this standard - violent altercations, hostile environment for a student, significant interference with instruction.
  •  
    Our Acceptable Use of the Internet policy next school year will definitely not only address cyberbullying, it will include a clause that states something to the effect, "If cyberbullying outside of school becomes an issue in which a student feels threatened or unsafe in any way at school, the principal has the authority to discipline the cyber bully." It will give the school community the clear message that cyberbullying will not be tolerated and at the very least will give me a little leverage when I need it.
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chosen password is your front-door lock - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. the distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in The CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in The user's manual on a manufacturer's Web site. If The user hasn't changed The default, that's an easy break-in.
  • ...3 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. these days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in The mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of The password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For The next quarter, The password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Anne Bubnic

Should schools teach Facebook? - 0 views

  •  
    FACEBOOK, MySpace, YouTube and Wikipedia are considered valuable educational tools by some who embrace the learning potential of the internet; they are also seen as a massive distraction with no academic benefit by others. Research in Nottingham and Notts suggests split opinions over the internet in the classroom. Some 1,500 interviews with teachers, parents and students nationwide showed the 'net was an integral part of children's personal lives, with 57% of 13 to 18-year-olds in Notts using blogs in their spare time and 58% in Nottingham. More than 60% of Nottingham teens use social networking sites. they are a big feature of leisure time - but now the science version of You Tube, developed by academics at the University of Nottingham, has been honoured in the US this week. the showcase of science videos shares the work of engineers and students online. However just a quarter of teachers use social networking tools in the classroom and their teaching, preferring to leave children to investigate outside school.
anonymous

Online Predators and Their Victims - 0 views

  • My (Liz B. Davis ) Summary of Key Points (All are quotes directly from the article): Online "Predators" and their Victims. Myths, Realities, and Implications for Prevention and Treatment. by: Janis Wolak, David Finkelhor, and Kimberly J. Mitchell - University of New Hampshire and Michele L. Ybarra - Internet Solutions for Kids, Inc.
  • The publicity about online"predators" who prey on naive children using trickery and violence is largely inaccurate.
  • adult offenders who meet, develop relationships with, and openly seduce underage teenagers
  • ...21 more annotations...
  • In the great majority of cases, victims are aware they are conversing online with adults. In the N-JOV Study, only 5% of offenders pretended to be teens when they met potential victims online. (112)
  • Offenders rarely deceive victims about their sexual interests.
  • promises of love and romance
  • 99% of victims of Internet-initiated sex crimes in the N-JOV Study were 13 to 17 years old, and none were younger than 12. 48% were 13 or 14 years old. (115)
  • ..Although Internet safety advocates worry that posting personal information exposes youths to online molesters, we have not found empirical evidence that supports this concern. It is interactive behaviors, such as conversing online with unknown people about sex, that more clearly create risk. (117)
  • take place in isolation and secrecy, outside of oversight by peers, family  members, and others in the youth's face-to-face social networks (115)
  • Most of the online child molesters described in the N-JOV Study met their victims in chatrooms. In a 2006 study, about one third of youths who received online sexual solicitation had received them in chatrooms. (116)
  • Youth internet users with histories of offline sexual or physical abuse appear to be considerably more likely to receive online aggressive sexual solicitations. (117)
  • it was those 15-17 years of age who were most prone to take risks involving privacy and contact with unknown people. (115)
  • We recommend educating youths frankly about the dynamics of Internet-initiated and other nonforcible sex crimes. Youths need candid, direct discussions about seduction and how some adults deliberately evoke and then exploit the compelling feelings that sexual arousal can induce. (122)
  • maintaining online blogs or journals, which are similar to social networking sites in that they often include considerable amounts of personal information and pictures, is not related to receiving aggressive sexual solicitation unless youths also interact online with unknown people. (117)
  • Boys constitute 25% of victims in Internet-initiated sex crimes, and virtually all of their offenders are male. (118
  • Some gay boys turn to the internet to find answers to questions about sexuality or meet potential romantic partners, and there they may encounter adults who exploit them. (118)
  • ..child molesters are, in reality, a diverse group that cannot be accurately characterized with one-dimensional labels. (118)
  • Online child molesters are generally not pedophiles. (118)Online child molesters are rarely violent. (119)
  • Child pornography production is also an aspect of Internet-initiated sex crimes. One in five online child molesters in the N-JOV Study took sexually suggestive or explicit photographs of victims or convinced victims to take such photographs of themselves or friends. (120)
  • Youths may be more willing to talk extensively and about more intimate matters with adults online than in face-to-face environments. (121
  • it may not be clear to many adolescents and adults that relationships between adults and underage adolescents are criminal. (122)
  • Simply urging parents and guardians to control, watch, or educate their children may not be effective in many situations. the adolescents who tend to be the victims of Internet-initiated sex crimes many not themselves be very receptive to the advice and supervision of parents. (122)
  • Online molesters do not appear to be stalking unsuspecting victims but rather continuing to seek youths who are susceptible to seduction. (117)
    • anonymous
       
      Let's remember that although there are direct references to gay and male pedophiles of gay boys, that 99% of child sex offenders identify as heterosexual, online or offline.
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
  •  
    This research article has the facts about sexual predatory behavior.
Anne Bubnic

School CyberSafety Presentation Leads to Arrest of Miami Man - 0 views

  • Attorney General Bill McCollum today announced that a Miami man is in custody on charges of sexual battery on a child. Acting on a tip received from a Clay County student at one of the Attorney General’s CyberSafety presentations, deputies from Clay County Sheriff Rick Beseler’s Office arrested Anthony Alexander Caldara, a mechanic serving active duty in the U.S. Navy, for sexually abusing a young girl. the tip was reported by the victim’s older sister to an investigator with the Attorney General’s CyberCrime Unit.
  • The older sister, a student at a local Clay County junior high school, approached The CyberCrime investigator after attending The Attorney General’s CyberSafety presentation. She reported to The investigator that she and her younger sister had been communicating with Caldara, 21, via cell phone and text messaging and Caldara had sent The children pornography. The two children eventually met Caldara in real life and a subsequent investigation revealed Caldara sexually abused The younger sister.
  •  
    Attorney General Bill McCollum today announced that a Miami man is in custody on charges of sexual battery on a child. Acting on a tip received from a Clay County student at one of the Attorney General's CyberSafety presentations, deputies from Clay County Sheriff Rick Beseler's Office arrested Anthony Alexander Caldara, a mechanic serving active duty in the U.S. Navy, for sexually abusing a young girl. the tip was reported by the victim's older sister to an investigator with the Attorney General's CyberCrime Unit.
adrinawinslet

Why Conversion Rate Optimization Matters For Your Online Business? - 0 views

  •  
    Conversion rates refer to the frequency of conversions achieved among those who visit the website or online store. This metric focuses on analyzing the effectiveness of the sales funnel by predicting the number of sales based on the number of visitors. Some Reasons Why You Need To Optimize the Conversion Rate Of Your Sales Funnel: 1. Increasing Fees for Pay-Per-Click (PPC) 2. Increase in competition 3. Increasing costs of digital marketing 4. Maximizing social media as a marketing platform 5. Managing the consumer's shortened attention span 6. Streamlining the business to produce sales 7. Investing in long-term solutions 8. Synergizes with marketing efforts such as affiliate marketing 9. Optimization results in immediate results Conversion Rate Optimization helps move the business towards becoming more competitive. Its effects are instant and it provides lasting results. You can acquire more customers in a shorter amount of time and lower cost. It is the foundation for a successful online business, and you should not overlook it.
realcounterfeits

Buy aed online - Buy fake 1000 dirhams- Real Counterfeits Money - 0 views

  •  
    Buy AED 1000 Online UAE Dirham banknotes were issued from the Central Bank of the United Arab Emirates, including this one thousand banknotes by Dirhams, in nine separate denominations. You belong to the new UAE Dirham series of banknotes. In 2000 these 1000 Dirham US banknotes were issued by the Central Bank of the United Arab Emirates. they are still in use at present. A sparrowhawk bird is on the UAE Bill of a thousand dirhams. the note 1000 UAE dirhams includes the words Central Bank of the United Arab Emirates the banknotes are sold at the lowest possible price for sale to minors. Companies such as Real Counterfeit Money give us the ability to use Emirati Dirham at the highest standard online at a very affordable price. This is better than staring at expensive cars of friends and worrying about whether or not we can afford to buy counterfeit money online. When you intend to purchase Emirati Dirham online, make sure you buy it through a reliable web services like Real Counterfeit Money. How safe are this falsified money online? the money generated by the Top Counter Money is entirely safe and secure. they are critically checked in the company's laboratories and then published for the common citizens. Guidelines and stringent protocols must be followed everywhere with fake banknotes. AED 1000 is available for sale in the online store and 100% safe online for purchasing AED 1000. Where to Buy AED 1000 Online there are a few websites that sell fake money online, but if you are a newbie, it is best for those fake money vendors to do careful research, because most of them are not so accurate. If you are not careful, you could lose your hard-earned money. Fortunately, you have a 100 % genuine direct manufacturer and retailer called Real Counterfeit Money, to help you begin your journey online in the world of fake money. Even after the distribution cycle, we have the best-quality AED 1000 for sale at the lowest affordable rates. buy aed online, fake 1000 dirham
Anne Bubnic

Governor Signs Law To Educate Children On Internet Safety [Illinois] - 0 views

  • he new law takes effect January 1st and provides that the Internet safety curriculums in schools will begin with the 2009-2010 school year. the bill allows the age-appropriate unit of instruction to be incorporated into the current courses of study regularly taught in the districts’ schools.
  • Illinois’ partnership with the Netsmartz national Internet safety program was a Governor’s initiative that was launched in 2006.
  • Earlier this week, Governor Blagojevich signed into law the state’s new Cyberbullying law. It clarifies the definition of harassing someone by using electronic communication such as the Internet and text messaging and enables the prosecution of someone who anonymously bullies in this capacity.
  •  
    Governor Rod Blagojevich Thursday signed Senate Bill 2512 legislation to help protect children from the dangers of the Internet. SB 2512 requires school districts, beginning in the 2009-2010 school year, to incorporate an "age-appropriate Internet safety unit of instruction in the current course of study regularly taught in the district's schools," beginning in third grade.
Anne Bubnic

Student Speech Rights in the Digital Age - 0 views

  •  
    Last year, the Court ducked an opportunity to determine in Morse v. Frederick whether public schools have authority to restrict student speech that occurs off of school grounds. the Court's refusal to address this issue was unfortunate. For several decades lower courts have struggled to determine when, if ever, public schools should have the power to restrict student expression that does not occur on school grounds during school hours. In the last several years, however, courts have struggled with this same question in a new context -- the digital media. Around the country, increasing numbers of courts have been forced to confront the authority of public schools to punish students for speech on the Internet. In most cases, students are challenging punishments they received for creating fake websites mocking their teachers or school administrators or for making offensive comments on websites or instant messages. More often than not, the lower courts are ruling in favor of the schools.
Anne Bubnic

The Anthropology of Digital Natives Webcast (Library of Congress) - 0 views

  •  
    Young people today born into a digital world are experiencing a far different environment of information-gathering and access to knowledge than a generation ago. Who are these "digital natives" and what are they thinking? How are they using the technology, and are IT experts adequately responding to them? these questions will be addressed in a new Library of Congress series titled "Digital Natives." the four-lecture series will examine the generation that has been raised with the computer as a natural part of their lives, with emphasis on the young people currently in schools and colleges today. the series will seek to understand the practices and culture of these digital natives, the cultural implications of the phenomenon and the implications for education -- schools, universities and libraries.
Anne Bubnic

From MySpace to Hip Hop: New Media in the EveryDay Lives of Youth - 0 views

  •  
    On April 23, 2008, public forum, "From MySpace to Hip Hop: New Media In the Everyday Lives of Youth," reported on the interim findings of the ethnographic project funded by the MacArthur Foundation, "Kids' Informal Learning through Digital Media," conducted by researchers at the University of California, Berkeley and the University of Southern California. This event addressed how digital technologies and new media are changing the way that young people learn, play, socialize and participate in civic life. the forum was presented by Common Sense Media, the MacArthur Foundation and the Stanford University School of Education.
Anne Bubnic

How children search the internet with keyword interfaces [PDF] - 0 views

  •  
    Children are among the most frequent users of the Internet, yet searching and browsing the web can present many challenges. Studies over the past two decades on how children search were conducted with finite and pre-determined content found in CD-ROM applications, online digital libraries, and web directories. However, with the current popularity of the open Internet and keyword-based interfaces for searching it, more critical analysis of the challenges children face today is needed. This paper presents the findings of an initial study to understand how children ages 7, 9, and 11 search the Internet using keyword interfaces in the home.
Anne Bubnic

New federal panel looks at Internet safety - 0 views

  • I’m not aware of any federal Internet safety commissions that met during the Bush administration. From what I can tell, that administration paid very little attention to Internet safety other than to add to the exaggerations and fear-mongering about so-called Internet predators. So is there any point in taking yet another look at Internet safety? Yes, if only because things have changed dramatically over the past few months. To begin with, we have a new administration led by a president who actually understands the Internet as well as the constitutional issues that arise whenever government tries to control online speech, access or even safety.
  • When the new working group convened Thursday, our first speaker was Susan Crawford, who works at the White House as special assistant to the president for science, technology and innovation policy. A law professor and founder of OneWebDay, Crawford brings a refreshing understanding of the government’s need to balance safety and security with civil liberties, privacy and even the First Amendment rights of minors. Her opening remarks helped set the tone for the group by admonishing us to “avoid overheated rhetoric about risks to kids online,” pointing out that “risks kids face online may not be significantly different than the risks they face offline.”
  •  
    Last year, Congress passed the Protecting Children in the 21st Century Act,which called for yet another committee to study Internet safety. By statute, the Online Safety and Technology Working Group is made up of representatives of the business community, public interest groups and federal agencies.
Anne Bubnic

Terror in the Classroom: What Can be Done?, Part 4 - 0 views

  • A survey conducted by MSN United Kingdom found that 74% of teens as compared to 80% in this study did not go to anyone for advice when they were cyberbullied (www.msn.co.uk/cyberbullying, 2006). One reason some teenagers are reluctant to tell parents or adults is the fear of retaliation.
  • Many times parents don't get involved because they are afraid of invading their teen's privacy. Others may feel that as long as they have filtering software their teen is protected from negative material.
  • Parents need to be educated about cyberbullying- what it looks like, what the effects are and how to handle it. Rosalind Wiseman, educator and author of the best seller "Queen Bees & Wannabes", suggest parents consider the following: Use technology as an opportunity to reinforce your family values. Attach rules and consequences if inappropriate behavior occurs. Move the computer out of your child's bedroom and into the family room. Teach your child not to share passwords. Install monitoring and filtering software. Monitor your child's screen name(s) and Web sites for inappropriate content. If cyberbullying occurs, save and print out any evidence and decide whom you should contact for assistance.
  • ...1 more annotation...
  • n Tinker v. Des Moines Independent Community School District, 393 U.S. 503 (1969). The court ruled that a student's right to free speech can be limited when The speech "materially disrupts class work or involves substantial disorder or invasion of The rights of oThers." The standard of "material disruption" set by Tinker is often referred to by The courts
  •  
    What Can Parents Do? Schools should start addressing students, parents and staff about the issues of cyberbullying. Students need to be reminded that what they do in cyberspace is not really anonymous. they need to know their behaviors and words are downloadable, printable and sometimes punishable by law. the courts have given some direction for schools dealing with cyberbullying. "School districts are well within their legal rights to intervene in cyberbullying incidents - even if these incidents were initiated off-campus - if it can be demonstrated that the incident resulted in a substantial disruption of the educational environment"
Anne Bubnic

District Posting Policies for Web Content - 0 views

  •  
    This district directly addresses a code of ethics about content posted to the web. the content of Arp ISD Website, DVDs, CDs, videos, PodCasts, streaming video sessions, and publications directly reflect on the image of the district and as such must be handled responsibly, ethically, and taken seriously. Publications and media are intended to be used for the communication of school information and the activities of classes, clubs, athletics and other school events. the content of these Web pages and publications follow the same guidelines as the Arp ISD's acceptable Internet use policy. Submissions to the site will not permit unacceptable, obscene, derogatory or objectionable information, language, media or images.
Anne Bubnic

California AB 86 Assembly Bill - Pupil Safety - 0 views

  •  
    The California Department of Education (CDE) and The Office of The Attorney General (AG) co-administer The School/Law Enforcement Partnership program. The Partnership has funded The Kern County Office of Education for a five-year period to administer The statewide School Safety and Violence Prevention Training Grant. The grant provides for safe schools planning, bullying prevention, and crisis response training. This training program does not currently include prevention of bullying that occurs via electronic communication devices. Need for The bill : A poll commissioned in 2006 by Fight Crime: Invest in Kids, showed that one in three teens and one in six preteens have been victims of cyber bullying and that more than 2 million of those victims told no one about The attacks.
Rafael Ribas

Is Google Making Us Stupid? - 0 views

  • we may well be reading more today than we did in the 1970s or 1980s, when television was our medium of choice. But it’s a different kind of reading, and behind it lies a different kind of thinking—perhaps even a new sense of the self.
  • Once I was a scuba diver in the sea of words. Now I zip along the surface like a guy on a Jet Ski.
  • Even a blog post of more than three or four paragraphs is too much to absorb. I skim it.
    • Rafael Ribas
       
      Yet I am managing to read the whole of this post... ;)
  • ...3 more annotations...
  • the circuits woven by our use of the Net will be different from those woven by our reading of books and other printed works.
  • The Net’s intellectual ethic remains obscure.
  • Old media have little choice but to play by the new-media rules.
    • Rafael Ribas
       
      Does that apply to the "old teaching"?
  •  
    Via Dan Shareski. Is the way we read changing the way we think? Interesting implications for our students, who have grown in this environment yet are often taught in "the old way".
  •  
    This is the cover story for the current issue of the magazine so it is attracting a lot of attention from readers. You can follow the commentary at: http://digg.com/tech_news/Is_Google_Making_Us_Stupid_Nicholas_Carr
Anne Bubnic

ThinkQuest International 2008 Winners Announced - 0 views

  •  
    ThinkQuest Newswire Announcement: Students from 13 countries took top honors in this year's ThinkQuest International 2008 Competition. The competition is utilized by teachers to engage Their students in developing critical skills for life and work in The 21st century.This year's winning teams collaborated in The research, writing and creation of websites on educational topics ranging from maThematics to promoting tolerance and preventing bullying.

    ThinkQuest International 2008 included 972 teams from 60 countries and The winning entries included students from Argentina, Australia, Canada, China, Egypt, India, Japan, Singapore, Thailand, Tunisia, United Kingdom, United States and Vietnam. Each team had approximately eight months to complete Their final websites. The submissions were Then reviewed by an international panel of volunteer judges who selected The winners in each of The three age divisions. The judges also awarded The "Global Perspectives" prize to The team best exemplifying respect for diversity and recognition of global interdependence.

Anne Bubnic

Kids' Informal Learning with Digital Media [Digital Youth Research] - 0 views

  •  
    UC Berkeley study administered by the Institute for the Study of Social Change and funded by the MacArthur Foundation. the complete findings on three years of ethnographic work [22 different case studies of youth engagement with new media] will be published in Summer 2008. the project has three general objectives. the first objective is to describe kids as active innovators using digital media, rather than as passive consumers of popular culture or academic knowledge. the second objective is to think about the implications of kids innovative cultures for schools and higher education, and engage in a dialogue with educational planners. the third objective is to advise software designers about how to use kids innovative approaches to knowledge and learning in building better software. the research focuses on learning and cultural production outside of schools: in homes, neighborhoods, after school, and in recreational settings.
Anne Bubnic

Privacy Playground: The First Adventure of The Three CyberPigs - 0 views

  •  
    Privacy Playground: The First Adventure of The Three Little CyberPigs was developed by The Media Awareness Network. In this game, designed for ages 8-10, The CyberPigs play on Their favourite Web site and encounter marketing ploys, spam and a close encounter with a not-too-friendly wolf. The purpose of The game is to teach kids how to spot online marketing strategies, protect Their personal information and avoid online predators. The accompanying Teacher's Guide explains how to play The game, gives background information on The issues of online marketing, spam and children's privacy and provides activities and handouts for classroom use.
« First ‹ Previous 61 - 80 of 2099 Next › Last »
Showing 20 items per page