Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items matching "p" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
jordanspieths

Golden Goose DB Sneakers Shoes Sale Online Store - 0 views

  •  
    Golden Goose Deluxe Brand Sneakers are hot on sale online, Welcome to buy new arrivals Golden Goose Sneakers save up to 70% off, free fast shipping. Save The Skin Golden Goose Womens Sneakers After Losing Weight Successfully Complexion sallow You must be because of weight loss with little to eat protein rich meat, and you will easily find the body cold, dizzy. This is the result of poor circulation, causing redness of the skin you do not always look pale or yellow skin. What to do: Eat more foods containing meat protein, and vitamin C, E components of fruits and vegetables, so that your blood circulation smooth, rosy skin there glory. Swollen Golden Goose Mens Shoes Sale face Rarely eat meat during the diet, resulting in insufficient intake of iron supply needs, resulting in anemia. The iron deficiency may affect your liver function, swelling of your face into a pie face. What to do: you can drink two cups of coffee a day, black tea or green tea and other beverages, these drinks contain caffeine, a diuretic function, can help you eliminate the phenomenon of swelling. Deepen wrinkles Some people suggest a metaphor between weight gain and weight loss as the gas and then eliminate the full-blown balloon, balloon retracted after becoming wrinkled; your skin is the same, rapid weight loss will make the original wrinkles get deeper, and even a new pattern of obesity. What to do: Less wiping powder, drink plenty of water to maintain moisture. Firming Cream skin care every day, step by step to lose weight, you can slim down while in a Golden Goose Sneakers Sale healthy and beautiful skin. Tough skin Your blood circulation getting worse, not smooth delivery of nutrients to the skin,
Anne Bubnic

America's Libraries adapted to digital age - 0 views

  • As a group, libraries have embraced the digital age," said Lee Rainie, founding director of the pew Internet & American Life project, which has surveyed public attitudes toward libraries. "They've added collections, added software and hardware, upgraded the skills of their staff. A lot of institutions have had to change in the Internet age, but libraries still have a very robust and large constituency." A December 2007 pew survey found that more than half of Americans — 53% — visited a library in the past year. That's expected to grow as more people look for free resources and entertainment in a slowing economy.
  • At the one-room Watha T. Daniel/Shaw Interim Library in the District of Columbia, books still line the shelves. But on one recent day, almost every adult at the library sat in front of a computer, surfing the Web, checking e-mail or visiting a social networking site.
  • The analysis found that libraries are thriving in the Internet age: •Attendance increased roughly 10% between 2002 and 2006 to about 1.3 billion. Regionally, Southern states lag the rest of the country in visits per capita. •Circulation, which measures how often library visitors check out print or electronic materials, increased about 9%, from 1.66 billion to 1.81 billion during the five-year period.
  • ...2 more annotations...
  • •The number of Internet-capable computers soared 39% — from about 137,000 in 2002 to nearly 190,000 in 2006. Libraries in rural states in New England and the Midwest led the country in public computers per capita in 2006. The increase in Internet access is thanks in part to the Bill & Melinda Gates Foundation, which launched a national program in 1997 to bring the Internet to libraries, beginning with the South. By 2003, the foundation had spent $250 million on some 47,000 computers, as well as training and tech support, bringing almost every public library online, said Jill Nishi, deputy director of the foundation's U.S. Libraries initiative. "You should be able to walk into any library and find Internet service," she said. "It's free, unfettered access to information."
  • Free Internet access is particularly important for low-income people, said Ken Flamm, an economics professor at the University of Texas at Austin who has studied the role of the Internet in public libraries. Only about a third of households with incomes below $25,000 have Internet access, according to federal data.
  •  
    The Internet was supposed to send America's public libraries the way of eight-track tapes and pay phones. But it turns out, they're busier than ever. Libraries have transformed themselves from staid, sleepy institutions into hip community centers offering
Falcon Emergency

Getting Started with Diigolet - Diigo help - 0 views

  • Tags help you find and organize your bookmarks by letting you select all of your bookmarks with a certain tag or combination of tags. Quickly add relevant tags to a bookmark by clicking on any of the recommended tags that appear under the description field on the “Save Bookmark” pop-up. When you are satisfied with the information in the “Save Bookmark” pop-up, click the “Save Bookmark” button. Now a link to the page is stored in your Diigo library, and the information you entered is stored with it.
  • Highlight Highlighting lets you denote important information on a page, just like highlighting in a book, but with Diigo, the highlighted text will be conveniently saved to your library as well. There are some important things for me to denote on my recipe. My wife doesn’t like pineapple, my grandfather can’t have eggs or chocolate, and I don’t like coconut very much, so I highlight those items on the recipe to let me know I need to deal with them. Highlight by clicking “Highlight” on the Diigolet. Then select the text you want to highlight. The text will be visually highlighted and the text is now stored in your library. It’s that easy. Click the button again to exit highlighter mode. You can also change the color of a highlight by clicking the downward-pointing arrow next to “Highlight” and choosing a color. Colors are useful for differentiating different types of highlights. I will use a different color for each of the different people I need to consider.
  • To add a sticky note to a highlight, simply move your mouse cursor over a highlight. When the little pop-up tab with the pencil on it appears, move the cursor to it and a menu will appear. Choose “Add Sticky Notes”. Now you can type and post a sticky note just like before, but this time it will be tied to the highlighted text.
Vicki Davis

Susan Silverman's Lucky Ladybugs project going on for elementary - 0 views

  • A Collaborative Internet Project for K-5 Students
  • Essential Question: Why are ladybugs considered to be good luck?
  • This project will demonstrate lesson plans designed following principles of Universal Design for Learning (UDL) and examples of student work resulting from the lessons.  As teachers we should ask ourselves if there are any barriers to our students’ learning.  We should look for ways to present information and assess learning in non-text-based formats. 
  • ...5 more annotations...
  • Based on brain research and new media, the UDL framework proposes that educators design lessons with three basic kinds of flexibility: 1. Multiple formats and media are used to present information.
  • Examples: Illustrations, pictures, diagrams, video or audio clips, and descriptions 2.   Teachers use multiple strategies to engage and motivate students. 3.   Students demonstrate learning through multiple performance and product formats.
  • UDL calls for three goals to consider in designing lessons: 1.  Recognition goals: these focus on specific content that ask a student to identify who, what, where, and when. 2.  Strategic goals: these focus on a specific process or medium that asks a student to learn how to do something using problem solving and critical think skills. 3. Affective goals: these focus on a particular value or emotional outcome. Do students enjoy, and appreciate learning about the topic? Does it connect to prior knowledge and experience? Are students allowed to select and discover new knowledge?
  • Resources you might want to use: Scholastic Keys, Kid Pix, InsPiration and KidsPiration, digital camera (still and video), recording narration/music, United Streaming.&amP;nbsP; Let your imagination go!
  • This project begins on March 15, 2007.  Materials need to be e-mailed by May 31, 2008.
  •  
    An excellent project for elementary students to connect with other classes.
  •  
    A great way to get started with technology is to join in an exciting project. this project by Susan Silverman was designed using the principles of Universal Design for Learning. I've heard her present and she is a pro. (Along with my friend Jennifer Wagner.)
Anne Bubnic

The Millennials Are Coming! - 0 views

  • Most agencies manage sensitive citizen data: addresses, Social Security numbers, financial records and medical information. You name it, some state or local office has it, and probably electronically. The problem? Many theorize that the Millennials' penchant for online openness could unintentionally expose private information, leaving it ripe for the picking. Millennials bring innovative ideas about technology's use, but for that same reason, do they also pose new security risks?
  • Anti-virus vendor Symantec released a study in March 2008 assessing this issue. Symantec commissioned Applied Research-West to execute the study, and 600 participants were surveyed from different verticals, including government. Survey participants included 200 IT decision-makers, 200 Millennial workers and 200 non-Millennial workers born before 1980. The data revealed that Millennials are more likely than workers of other ages to use Web 2.0 applications on company time and equipment. Some interesting figures include: 69 percent of surveyed Millennials will use whatever application, device or technology they want at work, regardless of office IT policies; and only 45 percent of Millennials stick to company-issued devices or software, compared to 70 percent of non-Millennials.
  • How might young people be workplace assets? Could all that time typing or texting make them speedy typists, able to whip up memos at the drop of a hat? Does familiarity with new and emerging technologies have its benefit? You bet, according to Dustin Lanier, director of the Texas Council on Competitive Government. The council brings state leaders together to shape policy for government departments, including IT. "I think they've built an approach to work that involves a lot of multitasking," Lanier said of the Millennials. "Something will be loading on one screen, you alt-tab to another application and pull up an e-mail, the first process loads, you flip back, start a new process, flip to a forum and pull up a topic. It's frenetic but normal to that group." Lanier doesn't think Millennials present more of an IT threat than their older co-workers. After all, young people don't have a monopoly on being distracted in the office. "I can't tell you how many times I've walked by people's desks of all ages and seen Minesweeper up," he said. He thinks employers should embrace some Web 2.0 applications. Otherwise, Millennials might be discouraged from sticking around. According to Lanier, this younger work force comprises many people who think of themselves as free agents. Government should accommodate some of their habits in order to prevent them from quitting.
  •  
    Get ready CIOs. They're coming. They have gadgets and doohickeys galore. They like their music downloadable and portable, and they grew up with the Internet, not before it. Their idea of community is socializing with people in other cities or countries through Facebook, MySpace or instant messages, and they use e-mail so often they probably think snail mail is an endangered species. They're the Millennials - those tech-savvy, 20-somethings and-under bound to warm up scores of office chairs left cold by retiring baby boomers. There's a good chance many will come to a government workplace near you, but their digital literacy could prove worrisome for security-conscious bosses.
Anne Bubnic

Protecting Children from Adult Content on Wireless Devices - 0 views

  • What You Can Do If you are concerned about your children accessing adult material from their wireless phones/devices, consider the following: Monitor how your children are using their wireless phones or other wireless devices. For example, are they using them mainly for talking, or are they using them for messaging, taking photos and downloading applications? Check with your carrier to see what types of material it offers and what types can be accessed from your children’s handsets. Check with your carrier to see if there are ways to prevent access to and downloading of content that may contain inappropriate material and that is available on a per-use or per-application basis (e.g., games, wall paper images, songs). Monitor your bill. Any content purchases made from a wireless phone should appear on your monthly bill, so check your bill to see if any purchases have been made from your children’s phones/devices. The FCC requires that the descriptions of charges on wireless carrier bills be full, clear, non-deceptive, and in plain language. Check with your carrier to see what handsets are available for your children that are not capable of accessing advanced applications that may contain adult material. Check with your carrier to see whether subscriptions to wireless data or wireless Internet packages also offer access to adult material on your children’s phone.
  •  
    With the benefits of wireless technology comes a potential harm: the growing use of wireless phones and devices by children affords them the opportunity to access adult material that may be inappropriate for them. The FCC offers 6 tips for wireless safety.
Anne Bubnic

Cyberbullying The Real Threat on the Digital Playground - 0 views

  • "Parents are the key to this whole issue," exPlains Leasure. "They need to be involved and monitoring the comPuter and Internet activity of their kids. If they see something that isn't right, they need to act as Parents and correct the issue."
  • parental awareness is truly the key to fixing this problem. If your child is the victim - or worse, the bully - it's time to step in. it's not being over-protective; it's trying to stop the current generation from 'virtually' destroying themselves emotionally
  • Cyberbullying Statistics: A recent survey of 395 students, ages 11 to 19, was conducted by the Kids/Teen Division of the Maine-based online safety organization Working To Halt Online Abuse. The study found that: � 28% of students have been cyberbullied, but... � Just over half tell their parents or another adult about it; of the students who did not report the cyberbullying, 25% felt it wasn't a big problem or didn't want to make a big deal out of it � 65% reported the cyberbullying was via IM, followed by email, MySpace, chat rooms and online games � 43% were cyberbullied by someone their age or in the same grade � 30% blocked or deleted the cyberbully, while 16% ignored them � 54 students admitted they had bullied somebody online themselves
  •  
    While reports and stories in the media focusing on Internet predators have become all too frequent, the closer-to-home threat to our children may really be cyberbullying, also known as electronic or online bullying. A recent survey of 395 students (11 to 19 years old) found that 28% of students have been cyberbullied, and more than 1 in 7 admitted to acting as the bully."Cyberbullying could be the biggest online threat facing teens today," says James Leasure, co-founder of pandora Corp. "Of course Internet predators do still exist, but statistically, kids have a much greater chance of being involved in some way with electronic bullying." Most cases of cyberbullying go undocumented because, fortunately, many kids are able to shrug off the 'unkind words' and look the other way. But there are some cases that make national headlines when they turn into tragedies, such as the Megan Meier case in 2006. Larger cases like this have prompted several states to adopt legislation that makes online bullying illegal.
Anne Bubnic

You Have to Be a Parent Online Too - 0 views

  • "When we were kids, our parents always told us not to talk to strangers. That was drilled into our heads," he said. "But now, we have to factor in what happens on the Internet."
  • Security settings and parental involvement are especially important in the virtual world, Morris urged. "Check your child's e- mail account on a regular basis. You're the parent; you can do that."
  • While social networking sites like Facebook, Myspace and Xanga can be hot-spots for sexual predators, "not everything about these sites is bad," Morris said, noting some of the most up-to-date information after the NIU shootings was found on Facebook. "Good things do occur, but we need to make sure we're monitoring them," he said. Morris urged the group to keep home computers in plain sight, to outline their expectations and review communications regularly with their children. "We want to build that level of communication with their kids," he said. "If they're talking to someone they shouldn't, we want them to be able to come to us. A child should be able to listen to a parent more than a predator."
  •  
    Parents today have resPonsibilities in both the real world and the virtual world, Kane County Regional Office of Education Director Phil Morris told the Elgin Academy community Tuesday.
Anne Bubnic

Internet safety worries parents - 0 views

  • Parents are worried about a new form of stranger danger in the form of cyber-bullying - abuse through email, chatrooms or text messaging.
  • The issues around Internet safety often arose when adults such as parents or teachers did not understand the importance of the online world to their children. "You get children as young as 8 now who say, 'Take away my phone and take away my life'," he said. When children thought they would be restricted from the Internet and mobile phones if they reported bad experiences, such as bullying, they were less likely to report it, he said.
  • They said the worst part of cyber-bullying was the distance between the perpetrator and the victim. "They don't have to see the consequences if they post a comment or a picture in a chatroom," Hannah said.
  •  
    The world of chatrooms and instant messaging is foreign to many adults, but a British advocate for children's cyber safety says they need to understand its importance to young people.
Anne Bubnic

California's 'digital divide' persists - [Survey Report] - 0 views

  • Slightly less than half of Latinos surveyed have home computers, compared to rates of 79 percent and above among black, Asian and white Californians, the survey found. While computer usage by blacks and whites in California has increased, there's been a decline in computer usage by Latinos and Asians, though Asian use remains much higher than that of Latinos. The drop appears to be correlated with income, with a sharp divide in computer usage between those making less than $40,000 and those making more.
  • Only 48 percent of Latinos have home computers compared with 86 percent of whites, 84 percent of Asians and 79 percent of blacks Californians, the institute reported.
  • But Asians and Latinos have seen declines in use of computers. Latinos' computer use has declined from 64 percent to 58 percent since 2000, while Internet use remained unchanged. Asians' use of computers was much higher, but also declined from 91 percent to 81 percent; Internet use went from 84 percent to 80 percent. Only 48 percent of Latinos have home computers compared with 86 percent of whites, 84 percent of Asians and 79 percent of blacks Californians, the institute reported.
  •  
    The use of computers and the Internet by Latinos and low-income Californians continues to lag behind other groups, according to a survey released Thursday by the public policy Institute of California.
Anne Bubnic

Cyber Safety/Social Networking Safety Measures - 0 views

  • For the past two years Blumenthal and other states' attorneys general have negotiated with both Facebook and MySpace to implement more than 60 new safety measures to protect children from online predators and from gaining access to inappropriate content, like pornography.
  • Under the agreement with Facebook, its officials have agreed to prominently display safety tips, and to require users under the age of 18 to affirm that they have read the tips. Users over 18 can no longer search for under-18 users, and Facebook officials will automatically be notified when someone under 18 is in danger of providing personal information to an adult user.
  • Parents will also be Provided with tools to remove a child's Profile from the site. InaPPro­Priate images and content will be removed, and ads for age-restricted Products, like alcohol and tobacco, will be limited to users old enough to Purchase those items. Most significantly, Facebook agreed to diligently search for and remove Profiles of registered sex offenders, and it will "in­crease efforts to remove grouPs for incest, PedoPhilia, cyber-bullying and other violations of the site's terms of service and exPel from the site individual violators of those terms."
  • ...2 more annotations...
  • Under the agreement, MySpace now allows parents to submit their child's e-mail address to prevent anyone from using that e-mail address to set up a profile (e-mail addresses are required in order to set up an account for either Facebook or MySpace, and people may search for "friends" by entering e-mail addresses). For anyone under 16, MySpace will automatically set the profile to "private," allowing only approved people to view the profile. There is now a closed "high school" section of the site set aside for users under 18.
  • Like Facebook, MySpace officials will also "obtain and constantly update a list of pornographic Web sites and regularly sever any links" between the sites. MySpace agreed to provide a way to report abuse on every page that contains content. The site's officials also prom­ised to respond to complaints of inappropriate content within 72 hours.
  •  
    Connecticut Attorney General Richard Blumenthal has made it one of his priorities to install methods of protection for the state's children when it comes to using these Web sites, hoping to "make social networking safer," according to a press release generated by his office. Efforts by Facebook and MySpace to protect privacy are described in this article.
Judy Echeandia

Cyberbullying: Parents, Tech ComPanies Join Forces to KeeP Kids Safe - [FOXNews.com - 10/13/08] - 0 views

  • Tech companies are releasing new software products that monitor and police kids' Internet use, helping them avoid cyberbullying and letting parents know when it's occurring. Internet monitoring software like CyberBully Alert lets kids notify parents when they're being bullied and takes a screen shot of the computer when a child clicks an alert icon. programs like Cyberpatrol and Spector allow parents to keep tabs on everything kids do on MySpace and Facebook, and keep screen snapshots and a record of what kids write in chat and instant messages.
    • Vicki Davis
       
      Interesting that there is now a program - CyberBully Alert that helps parents protect their children from harrassing behavior.
  • Using these programs, parents can also block Web sites and downloads of movies, music or images. Verizon announced in June that it will begin offering similar free security tools for parents. Internet security software maker Symantec has an online tool it will preview to some parents next month that will notify them by text message when a child attempts to access a forbidden site. The tool, code-named Watchdog until its official release, also lets parents control who is on the child’s buddy list. Symantec offers online tips at its Norton Family Resource Center.
  • software maker CyberPatrol is releasing a series of Internet videos for Parents.
  • ...1 more annotation...
  • The best defense, Criddle said, is a strong offense.
  •  
    Tech companies are releasing new software products that monitor and police kids' Internet use, helping them avoid cyberbullying and letting parents know when it's occurring.
Judy Echeandia

Teaching Teenagers About Harassment - 0 views

  • About 20 percent of teenagers have posted or sent nude cellphone pictures of themselves, according to the National Campaign to prevent Teen and Unplanned pregnancy, a nonprofit group.
  • digital dating violence.
  • The behaviors can be a warning sign that a teenager may become a perpetrator or a victim of domestic violence, according to the group.
  • ...6 more annotations...
  • teenagers frequently received digital threats or upsetting requests from people they were dating. But the teenagers were not talking about it, did not know how to handle it and did not know what was appropriate and what was not.
  • “It was abuse that there was no protocol around,” Mr. Law said. The parents were not aware of the interactions, and the teenagers did not know how to prevent it, he said.
  • The campaign and its Web site, ThatsNotCool.com, encourage teenagers to set their own boundaries. It is intended to appeal to all teenagers, not just those with serious problems. “The kids don’t want to be told what’s right and what’s wrong,” Mr. Law said. On the site, teenagers can send one of 35 “callout cards” — brightly colored messages they can send by e-mail, post to their Facebook or MySpace accounts or download — that are meant to tell someone they have crossed a line. The messages are sharp. For example: “Congrats! With that last text, you’ve achieved stalker status.”
  • The site offers an area where teenagers can seek advice, like how to stop a boyfriend from nonstop text-messaging. For more direct advice, the site tells teenagers to call or conduct a live chat with trained volunteers.
  • The campaign is digitally focused, reflecting the way teenagers communicate. Even the posters that will appear in schools, which display some of the “callout card” messages, ask viewers to snap a photo with their cellphone and text-message it to someone.
  • All of the communications are aimed at teenagers, not parents. Ms. Soler said the fund was working on a campaign to alert parents to problems, but for now, she wanted to get teenagers discussing them.“We want to give them the tools to say ‘You can have a healthy relationship, and here’s the road map,’ ” Ms. Soler said.
  •  
    A New Ad Warns About Abusive Texting\nA new public service ad highlights the growing problems of "textual abuse," where harassment of children occurs by way of text messages.
JOSEPH SAVIRIMUTHU

Changes at MySpace Signal a Move Away From Social Networking | - 0 views

  • SHARETHIS.addEntry({ "title": "Changes at MySpace Signal a Move Away From Social Networking", "url": "http://www.thewrap.com/article/2736", "published": "1240950792" }, { "button": true })ShareThis yahooBuzzArticleHeadline = "Changes at MySpace Signal a Move Away From Social Networking"; yahooBuzzArticleSummary = "Sign of the times: One senior executive for comedy at MySpace has 1,403 friends on Facebook."; yahooBuzzArticleCategory = "entertainment"; yahooBuzzArticleType = "text"; thewrapcom49:http://www.thewrap.com/article/27363 votesBuzz up! Slideshow Depeche Mode's Traffic-Stopping Concert Depeche Mode celebrated the release of its 12th studio album, "Sounds of the Universe," with a free concert on Hollywood Boulevard Thursday evening -- which literally stopped traffic. The performance, which also appeared on ABC's "Jimmy Kimmel Live!" later in the evening, drew a reported crowd of over 10,000. (photographs by Jonathan Alcorn) Keywords Facebook news corp MySpace Chris Van Natta
Falcon Emergency

Getting Started with Chrome extension - Diigo help - 0 views

  • Use the “Save” option to bookmark a page. Bookmarking saves a link to the page in your online Diigo library, allowing you to easily access it later.
  • Highlighting can also be accomplished from the context pop-up. After the Chrome extension is installed, whenever you select text on a webpage, the context pop-up will appear, allowing you to accomplish text-related annotation. Highlight pop-up Menu – After you highlight some text, position your mouse cursor over it and the highlight pop-up menu will appear. The highlight pop-up menu allows you to add notes to, share, or delete the highlight.
  • Sticky Note Click the middle icon on the annotation toolbar to add a sticky note to the page. With a sticky note, you can write your thoughts anywhere on a web page.
Anne Bubnic

Parents learn how to safeguard children against Portable PornograPhy - 0 views

  • Along with marketed content for the PlayStation Portable, Nicolakis said Playboy started a service called iBod. The service started in 2005 and allows users to download soft Porn to their device. WallPaPer of nude Photos and exPlicit ring tones are some of the other materials available through built-in Web browsers in Portable devices like the iPhone, Nicolakis said, and Parental safeguards are nonexistent or just now becoming available. He said another avenue for PornograPhic material is user-generated Photos or videos sent from cell Phone to cell Phone. Teens are rePortedly taking sexually exPlicit Photos of themselves and sending them to friends, but the images can easily be sent without consent to others, Nicolakis said. "That's child PornograPhy, and that's a felony," he said. "If you think you're immune to it here in Modesto, you're wrong. It's Probably already haPPened, you just don't know yet.
  •  
    Diane Hillas considers herself illiterate when it comes to technology, so she was surprised to hear her 12-year-old son's playStation portable game console can be used to download Internet pornography. The 51-year-old Modesto mother of three was at a cyber safety seminar at Modesto's Greek Orthodox Church of the Annunciation on Saturday afternoon, and said she would check every portable communication device her family owns once she got home.
Anne Bubnic

Cyber Bullying - School Policies? - 0 views

  • A punch in the eye seems so passé. Bullies these days are traveling in packs and using cyberspace to their humiliating messages online. Like the toughies of old, they are both boys and girls and they demand nothing less than total submission as the price of peace. It’s a jungle out there. For school districts, patrolling the hallways and adjacent grounds is just a start. In the 21st century, a new kind of vigilance is necessary—an expanded jurisdiction that serves to both stave off legal actions and ensure a safe and productive learning environment.
  • Today’s principals rely on district policy and practice to extend the presumed long arm of the law to off-campus incidents. potentially, that could mean plunging headlong into the electronic frontier to rescue student victims and thwart cyberbullying classmates who thrive as faceless computer culprits.
  • A December 2009 study by Harvard University’s Berkman Center for Internet & Society found that students on the receiving end report greater emotional distress, are more likely to abuse substances, and are more frequently depressed.
  • ...8 more annotations...
  • The report concluded a child is more likely to face cyberbullying by fellow students than being stalked by an online predator. “Bullying and harassment are the most frequent threats minors face, both online and offline,” notes the Harvard report, Enhancing Child Safety & Online Technologies: Final Report of the Internet Safety Task Force to the Multistate Working Group on Social Networking of State Attorneys General of the United States.
  • Bullying can take a variety of forms. Incidents have included stealing passwords, impersonating the victim online, fake MySpace or Facebook pages, embarrassing photos or information being revealed, threats, rumors, and more. And, bullying tends to magnify the longer it exists.
  • Students sometimes will cyberbully teachers or other school employees
  • In January, a federal court in Connecticut ruled that Regional District 10 was within its rights to discipline a student over an off-campus blog. Judge Mark Kravitz rejected Avery Doninger’s claim that the school violated her free speech rights when they refused to let her serve as class secretary or to speak at graduation because of words she wrote at home
  • According to the Hartford Courant, the school district won “because the discipline involved participation in a voluntary extracurricular activity, because schools could punish vulgar, off-campus speech if it posed a reasonably foreseeable risk of coming onto school property, and because Doninger’s live journal post was vulgar, misleading, and created the risk of substantial disruption at school.”
  • In Florida, a high school senior and honor student was accused of cyberbullying after she wrote on Facebook: ‘’Ms. Sarah PhelPs is the worst teacher I’ve ever met! To those select students who have had the disPleasure of having Ms. Sarah PhelPs, or simPly knowing her and her insane antics: Here is the Place to exPress your feelings of hatred.’’ Katherine Evans, who was susPended for “bullying and cyberbullying harassment toward a staff member,” sued the charter school in December 2008. A final ruling is Pending.
  • In a 2007 incident, 19 students were suspended at a Catholic high school near Toronto for cyberbullying a principal on Facebook. The students called the principal a “Grinch of School Spirit” and made vulgar and derogatory comments. While the U.S. Constitution does not necessarily apply in private school settings, the incident demonstrates that this kind of behavior can happen anywhere.
  • Districts should have a cyberbullying policy that takes into account the school’s values as well as the school’s ability to legally link off-campus actions with what is happening or could happen at school.
  •  
    Good article from AMERICAN SCHOOL on the policies that schools need to have in place to protect both students and teachers from cyberbullies.
JOSEPH SAVIRIMUTHU

Child Online Protection initiative (COP) - 0 views

  • Draft Guidelines   Draft Guidelines for Children Draft Guidelines for parents, Guardians and Educators Draft Guidelines for Industry Draft Guidelines for policy Makers
  •  
    The Guidelines on Child Online Protection (COP) are aimed at establishing a safe and secure cyberworld for future generations. The set of four guidelines advocate emPowering children and young PeoPle through education and awareness; Providing information, advice and safety tiPs for Parents, guardians and educators; and Providing key information to Policy makers as well as to industry in order to formulate national and international strategies.
JOSEPH SAVIRIMUTHU

Police find difficulties investigating Internet harassment - 0 views

  • A local woman believes her story illustrates just how frustrating it can sometimes be fighting Internet harassment.   Tina Austin claims someone harassed her by posting information on the popular trading website, craigslist.org, last February.   The postings gave Austin’s name and work cell phone number.   The three separate postings claimed Austin was giving away a diamond necklace, a Chevy Suburban, and another which was, let’s just say an “R” rated request.   “I ended up getting [the most phone calls for the diamond necklace],“ Austin said Wednesday.  “[I didn’t get] quite as much for the Suburban.“
  •  
    Story of a woman who was harrassed through repeated CraigsList postings and fake ads directing people to her phone number.
Anne Bubnic

Cell Phone Safety - 0 views

  • The fact that cell phones pose a great risk when combined with driving cannot be of any surprise to anyone. Let’s face it. First, drivers must take their eyes off the road while dialing. Second, people can become so absorbed in their conversations or other cell phone use that their ability to concentrate on the act of driving is severely impaired, jeopardizing the safety of vehicle occupants and pedestrians alike.
  • Time Away from Homework. Technology affords teens (and adults) a host of ways to do something other than what they are supposed to, in this case homework.
  • Mounting Minutes ($$$) Since consumers must be 18 in order to purchase a cell phone contract in the United States, most parents are buying the phones their children carry. This is good news because parents can choose a plan that fits how the cell phone will be used and can review monthly cell phone bills which typically includes a log itemizing phone activity. However, problems still exist. For one, children can quickly go over their allotted minutes for the month which can leave their parents with bills that can easily approach hundreds of dollars for the month.
  • ...1 more annotation...
  • Cell Phones and Gaming According to Sullivan (2004)3, when cellular Phone games were simPle, such as the knockoffs of the Atari-era "Breakout," there wasn't much to worry about. But newer Phones with color disPlays and higher Processing Power create a landscaPe that might make some Parents worried about what their kids are Playing on the bus home from school.
  •  
    Today's cellular phones (cell phones) are more than just phones, they are hightech appliances that also serve as a mini-computers. Cell phones are electronic gadgets that allow users to surf the web, conduct text chats with others, take photos, record video, download and listen to music, play games, update blogs, send instant text messages to others, keep a calendar and to-do list, and more, much more. But cell phones also carry risks and cause distractions.
1 - 20 of 132 Next › Last »
Showing 20 items per page