Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items matching "user" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Anne Bubnic

Teens Earn Real Cash in Virtual World - 0 views

  • According to Virtual Worlds Management, more than 100 youth-oriented virtual worlds are either now live or in development, including offerings from MTV and Disney (DIS - Cramer's Take - Stockpickr). Research firm eMarketer estimates that 24% of the 34.3 million users ages three to 18 used virtual worlds at least monthly in 2007 -- and that will jump to 53% by 2011.
  •  
    If a young person wants to experiment with running a business, they're not just engaging in thought experiments and case studies; they're actually working with real people and real money," says Joey Seiler, editor of VirtualWorldNews.com, an industry news source that's part of Virtual Worlds Management, a company that provides trade events, media, research and online services.
Anne Bubnic

University of Alabama and Hoover Schools Embrace Second Life - 0 views

  • Several local teachers and professors see Second Life as a tremendous opportunity. There are educational islands in Second Life where teachers can go to digitally swap ideas, conduct research or attend real life conferences.
  • However, a teacher can take students on a virtual field trip in Second Life - using his or her own login - to places like the Alamo or the Louvre Museum, both of which have been impressively recreated in Second Life.
  • The University of Alabama is using Second Life too. In fact, Professor Rick Houser, Chairman of Educational Studies at the Capstone, is working on building an entire virtual University of Alabama campus in Second Life.
  • ...2 more annotations...
  • But how healthy is it for kids, especially younger ones, to be spending time in a virtual world when there’s a real world they need to learn to navigate? What about on-line predators? Second Life does not verify the age a user enters.
  • These students are growing up as digital natives. They want to use this, they want to be engaged in these types of technologies and it’s important for us to facilitate that learning,” she says.  Brandt also wants to teach students the dangers they need to be aware of when using Second Life or any type of social networking website. She calls it “good digital citizenship”.
  •  
    This week, the Hoover Board of Education is holding a technology training seminar to help teachers get up to speed for the new school year. On the agenda - a powerful and somewhat controversial website called "Second Life".
Madeline Brownstone

Young Bloggers/Online News Users - More Informed On 1st Amendment Rights - 0 views

  •  
    High school students who blog, who read online news sources and who chat online regularly are more likely to understand and support their First Amendment rights, according to a new book based on the largest survey conducted on the subject.
Anne Bubnic

Messaging Shakespeare | Classroom Examples | - 0 views

  • Brown's class was discussing some of the whaling calculations in Moby Dick. When one student asked a question involving a complex computation, three students quickly pulled out their cell phones and did the math. Brown was surprised to learn that most cell phones have a built-in calculator. She was even more surprised at how literate her students were with the many functions included in their phones. She took a quick poll and found that all her students either had a cell phone or easy access to one. In fact, students became genuinely engaged in a class discussion about phone features. This got Brown thinking about how she might incorporate this technology into learning activities.
  • Brown noticed that many students used text messaging to communicate, and considered how she might use cell phones in summarizing and analyzing text to help her students better understand Richard III. Effective summarizing is one of the most powerful skills students can cultivate. It provides students with tools for identifying the most important aspects of what they are learning, especially when teachers use a frame of reference (Marzano, Pickering, & Pollock, 2001). Summarizing helps students identify critical information. Research shows gains in reading comprehension when students learn how to incorporate isummary framesi (series of questions designed to highlight critical passages) as a tool for summarizing (Meyer & Freedle, 1984). When students use this strategy, they are better able to understand what they are reading, identify key information, and provide a summary that helps them retain the information (Armbruster, Anderson, & Ostertag, 1987).
  • Text messaging is a real-world example of summarizing—to communicate information in a few words the user must identify key ideas. Brown saw that she could use a technique students had already mastered, within the context of literature study.
  • ...2 more annotations...
  • To manage the learning project, Brown asked a tech-savvy colleague to help her build a simple weblog. Once it was set up, it took Brown and her students 10 minutes in the school's computer lab to learn how to post entries. The weblog was intentionally basic. The only entries were selected passages from text of Richard III and Brown's six narrative-framing questions. Her questions deliberately focused students' attention on key passages. If students could understand these passages well enough to summarize them, Brown knew that their comprehension of the play would increase.
  • Brown told students to use their phones or e-mail to send text messages to fellow group members of their responses to the first six questions of the narrative frame. Once this was completed, groups met to discuss the seventh question, regarding the resolution for each section of the text. Brown told them to post this group answer on the weblog.
  •  
    Summarizing complex texts using cell phones increases understanding.
Vicki Davis

The Associated Press: Video of Teen Beating Raises Questions - 0 views

  • But that doesn't mean YouTube or any other media company should get the blame, legally or ethically, for the attack, media experts said Friday.
  • The teenagers have been arrested on charges that they beat the teen so they could make a video of the attack to post online. One of the girls struck the 16-year-old victim on the head several times and then slammed her head into a wall, knocking her unconscious, according to an arrest report.
  • From a legal standpoint, YouTube and other online service providers are largely exempt from liability because of a 1996 anti-pornography law. One provision says Internet service providers are not considered publishers simply because they retransmit information provided by their users or other sources.
  • ...1 more annotation...
  • "There is no legal reason this video cannot be shown. It is obviously distasteful, abhorrent what the teenagers did to the victim, but it doesn't really make sense (to ask), 'Should YouTube have taken it down?'" Morris said.
  •  
    It is very important to review this case and learn what can happen to prevet this sort of behavior.
  •  
    This horrific attack that was videoed and posted on youtube for attention brings many questions and the public spotlight again goes onto the digital world we are creating. It is making its own "rules" which really aren't any. It is time for educators to speak out or be spoken to about what to or not to do.
Anne Bubnic

Social Networking and Child Protection on the Internet [Report] - 0 views

  •  
    From the UK Home Office Task Force: Best Practices for the providers of social networking and other user interactive services. Download the full Report.

    The first UK Social Networking Guidance provides advice for industry, parents and children about how to stay safe online. This has been developed by a taskforce of representatives from industry, charity and law enforcement agencies including Vodafone, the Child Exploitation and Online Protection Centre (CEOP) and the National Society for the Prevention of Cruelty to Children (NSPCC).

Rafael Ribas

Why am I fighting for Social Networking? - 0 views

  • I think the main thing is that it is user centered - not course centered.
  • Moodle are so "course" oriented" it is hard to "force" them to be something else
  • Because of the demonization of "social" networks we must use terminology that will not cause parental and administrative heart attack
  • ...1 more annotation...
  • technology rich, pedagogic poor’ (Victorian Classroom on Steroids
  •  
    What do you think about the term "social" networking -- I rather like the term "educational" networking.
  •  
    This teacher is fighting for "social" networking -- I left a comment that she instead fight for "educational" networking. I think that the demonization of "social networking" by our media makes this term a death sentence for one's efforts.\n\nRead this post and see what you think.
Anne Bubnic

Podcasting Music: The legal implications - 0 views

  • Musical works. Performance rights organizations (ASCAP, BMI and SESAC) handle copyright licenses for the performance of musical works, including their performance in a podcast. Separate licenses are necessary from each performance rights organization because each company represents different publishers of composers' musical works. Sound recordings. Copyright licenses for the playing (or "performance") of sound recordings historically have been handled directly with the owners of the works, usually record companies. (Over-the-air broadcasters are not required to obtain copyright licenses for playing sound recordings. They must, however, hold licenses for playing the underlying musical works.)
  • Reproduction. By contrast to webcasting, a podcast may include a reproduction of a sound recording. Podcasting is an interactive activity. It results in the transmission of a sound recording which is fixed and is accessible on demand by the user. The reproduction requires clearances or licenses - for the sound recording, and for the musical work. Although the performance rights societies offer licenses to cover the musical works in a podcast, no uniform or industry-wide licensing scheme has developed yet to cover the sound recording.
  • This leaves the podcaster with three choices: to attempt to obtain licenses from the record companies; to limit podcasts to sound recordings not subject to copyright protection (generally, U.S. recordings pressed before February 15, 1972 [careful: a CD reissue of a pre-1972 recording is a new, protected, sound recording]); or to eliminate sound recordings altogether from podcasts.
  •  
    Copyright law protects musical and spoken compositions, or "works"; the performance of a work preserved in a sound recording; and the sound recording itself. Podcasting implicates these in three ways: the performance of a work; the playing of a sound recording of a performance; and the reproduction of a sound recording by incorporating it into a podcast. The law is well-settled only as to the first of these.
Anne Bubnic

Commoncraft Explanations in Plain English [Video] - 0 views

  •  
    CommonCraft now has their entire collection of "Explanations in Plain English" videos posted to their own YouTube Channel. See: social networking, twitter, blogs, wikis etc.
anonymous

Online Predators and Their Victims - 0 views

  • My (Liz B. Davis ) Summary of Key Points (All are quotes directly from the article): Online "Predators" and Their Victims. Myths, Realities, and Implications for Prevention and Treatment. by: Janis Wolak, David Finkelhor, and Kimberly J. Mitchell - University of New Hampshire and Michele L. Ybarra - Internet Solutions for Kids, Inc.
  • The publicity about online"predators" who prey on naive children using trickery and violence is largely inaccurate.
  • adult offenders who meet, develop relationships with, and openly seduce underage teenagers
  • ...21 more annotations...
  • In the great majority of cases, victims are aware they are conversing online with adults. In the N-JOV Study, only 5% of offenders pretended to be teens when they met potential victims online. (112)
  • Offenders rarely deceive victims about their sexual interests.
  • promises of love and romance
  • 99% of victims of Internet-initiated sex crimes in the N-JOV Study were 13 to 17 years old, and none were younger than 12. 48% were 13 or 14 years old. (115)
  • it was those 15-17 years of age who were most prone to take risks involving privacy and contact with unknown people. (115)
  • take place in isolation and secrecy, outside of oversight by peers, family  members, and others in the youth's face-to-face social networks (115)
  • Most of the online child molesters described in the N-JOV Study met their victims in chatrooms. In a 2006 study, about one third of youths who received online sexual solicitation had received them in chatrooms. (116)
  • Youth internet users with histories of offline sexual or physical abuse appear to be considerably more likely to receive online aggressive sexual solicitations. (117)
  • ..Although Internet safety advocates worry that posting personal information exposes youths to online molesters, we have not found empirical evidence that supports this concern. It is interactive behaviors, such as conversing online with unknown people about sex, that more clearly create risk. (117)
  • Online molesters do not appear to be stalking unsuspecting victims but rather continuing to seek youths who are susceptible to seduction. (117)
  • maintaining online blogs or journals, which are similar to social networking sites in that they often include considerable amounts of personal information and pictures, is not related to receiving aggressive sexual solicitation unless youths also interact online with unknown people. (117)
  • Boys constitute 25% of victims in Internet-initiated sex crimes, and virtually all of their offenders are male. (118
  • Some gay boys turn to the internet to find answers to questions about sexuality or meet potential romantic partners, and there they may encounter adults who exploit them. (118)
  • ..child molesters are, in reality, a diverse group that cannot be accurately characterized with one-dimensional labels. (118)
  • Online child molesters are generally not pedophiles. (118)Online child molesters are rarely violent. (119)
  • Child pornography production is also an aspect of Internet-initiated sex crimes. One in five online child molesters in the N-JOV Study took sexually suggestive or explicit photographs of victims or convinced victims to take such photographs of themselves or friends. (120)
  • Youths may be more willing to talk extensively and about more intimate matters with adults online than in face-to-face environments. (121
  • it may not be clear to many adolescents and adults that relationships between adults and underage adolescents are criminal. (122)
  • Simply urging parents and guardians to control, watch, or educate their children may not be effective in many situations. The adolescents who tend to be the victims of Internet-initiated sex crimes many not themselves be very receptive to the advice and supervision of parents. (122)
  • We recommend educating youths frankly about the dynamics of Internet-initiated and other nonforcible sex crimes. Youths need candid, direct discussions about seduction and how some adults deliberately evoke and then exploit the compelling feelings that sexual arousal can induce. (122)
    • anonymous
       
      Let's remember that although there are direct references to gay and male pedophiles of gay boys, that 99% of child sex offenders identify as heterosexual, online or offline.
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
  •  
    This research article has the facts about sexual predatory behavior.
Anne Bubnic

The Beehive - 0 views

  •  
    Symantec partnered with One Economy to add Internet Security content to their online information portal, The Beehive. This resource ensures that low-income families and new broadband users have the tools and resources necessary to protect their families.
Raymond Lai

Pandora 6.0 Computer Monitoring Software Will Help Parents Teach And Enforce Cybersafety, Cyberethics And Cybersecurity In The Home - 1 views

  •  
    Discussion between parents and children is the best way to create trust. But computer use especially by new users can not be expected to be "private" from their parents. Filtering has its place, but should be used to generate trust and not access blame or perjorative measures. Students will always find a way to circumvent filtering and internet restriction. What are you're opinions? Has anyone used PC Pandora 6? Ray http://www.google.com/profiles/Raymond.WM.Lai#buzz
Anne Bubnic

Facebook creates safety advisory board to protect child users - 1 views

  •  
    "The global board will include representatives from Internet safety groups with which Facebook already has relationships. They include Common Sense Media, ConnectSafely, WiredSafety, Childnet International and The Family Online Safety Institute." The global board will include representatives from Internet safety groups with which Facebook already has relationships. They include Common Sense Media, ConnectSafely, WiredSafety, Childnet International and The Family Online Safety Institute.
Anne Bubnic

Protecting Reputations Online in Plain English - Common Craft - 4 views

  •  
    Huge fan of Commoncraft. Now helping educators with Digital Citizenship.
  •  
    Aimed at young or inexperienced Web users, this video explains the long term risks of sharing inappropriate information online.
Anne Bubnic

ChatRoulette: Devil Incarnate or Accessible Public? - 1 views

  • Don't get me wrong: There is a high probability that you will run into the seedier side of the site in a matter of moments.  Some have argued that ~10% of the site's users are exposing themselves or their genitals through the site.  And, unlike pornographic spam, these exhibitionists are typically male.  
  •  
    It's easy to see new Internet phenomena and panic, especially when the technology in question opens up a portal to all of the weird parts of the Internet. This is precisely what is happening around ChatRoulette, a new peer-to-peer webcam-based video chat site. Although the site was built by a 17-year-old Russian high school student to connect with other teens, nearly every adult who has visited the site runs screaming that this is a terrible space for young people. In some senses, they're right. But the more that they panic and talk about how bad this is for teens, the more teens get curious and want to check it out. The result? A phenomenon generated through fear.
Anne Bubnic

Public Library's Teen Tech Week begins today - 2 views

  •  
    Teen Tech Week is a national initiative of the Young Adult Library Services Association aimed at teens, their parents, educators and other concerned adults. The purpose of the initiative is to ensure that teens are competent and ethical users of technologies, especially those that are offered through libraries. Some great ideas here for activities with cell phones!
Anne Bubnic

Chatroulette - not as private as some might think! - 0 views

  •  
    This is scary...especially if chat roulette users thought they were anonymous and if they're kids.
Anne Bubnic

Student accused of hacking into computers, sending threatening messages - 1 views

  •  
    A Lehigh Acres teen is accused of hacking into a Lee County school's computer system and sending threatening messages to parents. The student is facing charges of two counts of an offense against intellectual property/modify without authority computer support document, each a third degree felony, and three counts of an offense against computer users/computer crime/interrupt or impair a governmental operation or public communication, each a second degree felony.
Anne Bubnic

Pupils 'must manage online risks' - 2 views

  • The five schools judged outstanding for online safety all used managed systems to help pupils become responsible users of technology.
  •  
    Pupils given a greater degree of freedom to surf the internet at school are less vulnerable to online dangers in the long-term, inspectors say. "Managed" online systems were more successful than "locked" ones at safeguarding pupils' safety, they said. The inspectors' research was commissioned in response to a report by Dr Tanya Btron, which assessed the risks children faced when using the internet and video games.
Anne Bubnic

Social Insecurity: What Millions of Online Users Don't Know Can Hurt Them - 4 views

  •  
    Two out of three online U.S. households use social networks such as Facebook and MySpace, nearly twice as many as a year ago, according to the latest Consumer Reports State of the Net survey. But millions who use these services put themselves and their families at risk by exposing very sensitive personal information, according to the national survey of 2,000 online households conducted in January by the Consumer Reports National Research Center.
« First ‹ Previous 121 - 140 of 166 Next › Last »
Showing 20 items per page