Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items matching "computers" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
5More

The Newest Breed of Bully, the Cyberbully - 0 views

  • While some of what is published online may seem libelous (i.e., intended to harm the reputation of another), proving that point can be difficult and expensive. In order to prove libel, you have to prove malicious intent, something that might prove difficult if the offending Web page was put up by an adolescent. And many times, freedom of speech wins out.
  • Unless an actual crime has taken place, law enforcement officials often are unable to arrest anyone, even if they can identify the culprit. According to Lt. John Otero, commanding officer of the computer crime squad for the New York City Police Department, individuals would actually have to post a direct threat in order for the police to act. "For example, if they say, 'tomorrow I am going to hurt, kill, or injure an individual,' that would constitute a crime," he explains. A person posting such a threat could be arrested and charged with aggravated harassment. Although Otero says his department has seen some arrests, anyone under the age of 18 would not be dealt with harshly: "If the kid is too young, he would get a scolding and the incident would be brought to the parents' attention; if they are under 16, they are considered minors."
  • Like cliques, cyberbullying reaches its peak in middle school, when young adolescents are trying to figure out who their friends are and whether they fit in. "Third- and 4th-graders are just having fun with computers," says Loretta Radice, who taught computer skills to middle-schoolers in public and private schools for more than 15 years.
  • ...1 more annotation...
  • While the cyber- bully believes he cannot be caught, Radice notes that everyone leaves footsteps in cyberspace. "Everything is traceable," she says. "Kids often don't realize that."
  •  
    Because cyberbullying is such a new phenomenon, school and law enforcement officials in the United States and other countries are still sorting out the legal technicalities. "Most of what is done online is protected as free speech," says Frannie Wellings, policy fellow at the Electronic Privacy Information Center in Washington, DC.
9More

Curbing Cyberbullying in School and on the Web - 0 views

  • Many of the most egregious acts of cyberbullying do not take place during school hours or on school networks, a situation that presents a dilemma for public school administrators: If they punish a student for off-campus behavior, they could get hit with a freedom of speech suit.  If they do nothing, students may continue to suffer and school officials theoretically could get hit with failure to act litigation. For school administrators, it appears to be an unfortunate “catch-22.” For lawyers, it’s a “perfect storm,” pitting freedom of speech advocates against the victims of cyberbullying and schools that try to intervene. There are no easy answers in this arena, few laws, and no well-established precedents that specifically deal with cyberbullying.
  • “School administrators can intervene in cyberbullying incidents, even if the incidents do not take place on school grounds, if they can demonstrate that the electronic speech resulted in a substantial disruption to the educational environment.”
  • These cases illustrate not only a lack of precedent on cyberbullying cases, but also a dilemma for school administrators on how to handle cyberbullying.  “There are few laws that address how to handle cyberbullying, and many schools don’t have an internal policy to deal with cyberbullying that takes place off-campus,” offers Deutchman.  “It may take an unfortunate and tragic event on school property to get more schools to consider tackling electronic behavior that originates off campus.  It’s only a matter of time before a cyberbully, or the victim of cyberbullying, uses deadly force during school hours.”
  • ...5 more annotations...
  • So, what should schools do in the meantime?  First, school officials should establish a consistent internal policy (much like a crisis plan) and a team (minimally made up of the principal, school counselor, and technology director) to deal with cyber-misconduct. This team should fully document disruptive incidents and the degree to which the learning environment is affected. The principal should invite the cyberbully’s parents to review the offending material before considering disciplinary action. Most parents at this point will do the right thing.
  • Second, schools should educate children, starting in elementary school, about the importance of cyber-safety and the consequences of cyberbullying, especially on the school’s own network. These rules should be clearly posted in the computer labs and written in age-appropriate language. The rules should be sent home to parents each year—and they should be posted prominently on the school’s website.
  • Third, teachers should continue incorporating in their curriculum projects that utilize the web and other powerful new technologies. This probably won’t help schools avoid lawsuits; it’s just good pedagogy. It’s not surprising that schools that keep up with the latest technology and software—and employ teachers who care about the quality of online communication—report lower incidents of cyber-misconduct.
  • In addition, schools should update their codes of conduct to include rules that can legally govern off-campus electronic communication that significantly disrupts the learning environment. They should also assign enough resources and administrative talent to deal with students who engage in cyber-misconduct. One very big caveat: Disciplining a student for off-campus electronic speech should be done only as a last resort, and certainly not before seeking legal counsel.
  • Finally, schools should realize that not all cyberbullies need to be disciplined. Schools should act reasonably, responsibly, and consistently—so as to avoid the very bullying behavior they are trying to curb. Until the courts provide clear standards in the area of off-campus electronic speech for young people, these recommendations will go a long way in making schools a safer learning environment for everyone.
  •  
    Most school administrators have more than one story to tell about cyberbullying. They report that victims of cyberbullying experience low self-esteem, peer isolation, anxiety, and a drop in their grades. They note that victims may miss class or other school-related activities. Principals also point to recent high-profile cases where cyberbullying, left unchecked, led to suicide. In response, some schools have created new policies and curbed free speech on the school's computer network and on all electronic devices used during school hours. This article offers practical advice for actions schools can take to curb bullying, ranging from policy development to education.
5More

Humiliation and gossip are weapons of the cyberbully - 0 views

  • ead teachers are being advised to draw up new rules on mobile phone use amid a growing number of cases of what is now known as “cyber-bullying”. In many secondary schools, over 90% of bullying cases are through text messages or internet chatrooms. It is hoped that the rules about mobile phone use will protect children from abusive texts, stop phones going off in class and prevent mobiles being taken into exam halls.
  • Although the majority of kids who are harassed online aren’t physically bothered in person, the cyber-bully still takes a heavy emotional toll on his or her victims. Kids who are targeted online are more likely to get a detention or be suspended, skip school and experience emotional distress, the medical journal reports. Teenagers who receive rude or nasty comments via text messages are six times more likely to say they feel unsafe at school.
  • The problem is that bullying is still perceived by many educators and parents as a problem that involves physical contact. Most enforcement efforts focus on bullying in school classrooms, corridors and toilets. But given that 80% of adolescents use mobile phones or computers, “social interactions have increasingly moved from personal contact at school to virtual contact in the chatroom,'’ write Kirk R. Williams and Nancy G. Guerra, co-authors of one of the journal reports. “Internet bullying has emerged as a new and growing form of social cruelty.'’
  • ...1 more annotation...
  • Cyber-bullying tactics include humiliation, destructive messages, gossip, slander and other “virtual taunts” communicated through e-mail, instant messaging, chatrooms and blogs. The problem, of course, is what to do about it. While most schools do not allow pupils to use their mobiles in the school building, an outright ban is deemed unworkable. Advances in technology are throwing up new problems for teachers to deal with. Children use their phones to listen to music, tell the time or as a calculator. Cyber-bullies sometimes disclose victims' personal data on websites or forums, or may even attempt to assume the identity of their victim for the purpose of publishing material in their name that defames them or exposes them to ridicule.
  •  
    As more and more people have access to computers and mobile phones, a new risk to youngsters has begun to emerge. Electronic aggression, in the form of threatening text messages and the spread of online rumours on social networking sites, is a growing concern.
2More

Teen Hacker Could Get 38-Year Sentence for Fixing Grades - 0 views

  • Omar Khan, 18, a student at Tesoro High School in Rancho Santa Margarita, now faces 34 felony counts of altering a public record, 11 felony counts of stealing and secreting a public record, seven felony counts of computer access and fraud, six felony counts of burglary, four felony counts of identity theft, three felony counts of altering a book of records, two felony counts of receiving stolen property, one felony count of conspiracy and one felony count of attempted altering of a public record.
  •  
    They may be just kids, but two Orange County, Calif., teens are accused of committing a whole bunch of grown-up crimes. The allegations include hacking into school computers to change grades and planting spyware on a district computer. One of them faces 69 felony charges, which could land him in prison for up to 38 years if he's convicted.
6More

Identity Theft Leads to Child-Porn Arrest Nightmare - 0 views

  • Simon Bunce of Hampshire, England, not only had his credit-card number stolen online but was arrested and falsely accused of being a pedophile when that card number was used to buy child pornography.
  • Yet that only came after he'd lost his $250,000-a-year job, his father and siblings stopped talking to him and his computer was taken away for several months, the BBC reports. Bunce had the misfortune of being caught up in Operation Ore, a massive British online kiddie-porn crackdown in 2003 that itself grew out of Operation Avalanche, an earlier American bust which began with a 1999 raid on Landslide Productions, a Texas mom-and-pop operation that handled credit-card transactions for porn Web sites.
  • about 7,200 people — whose card numbers showed up on the list.
  • ...2 more annotations...
  • Bunce was arrested "on suspicion of possessing indecent images of children, downloading indecent images of children and incitement to distribute indecent images of children" — all before a single image of such had been found on his computers at home and at work. He quickly found himself unemployed and estranged from his family. But his wife stuck by him, and while his computer sat in police custody waiting to be examined, Bunce took action.
  • Bunce used the U.S. Freedom of Information Act and a catalog of Internet Protocol addresses to establish that his credit-card number had been used in Jakarta, Indonesia, to buy child pornography online at the same moment he used the card to pay the bill at a London restaurant.
  •  
    Learning how to safely use e-commerce websites is important, but also, people need to be aware to protect their credit card numbers and identities as can be seen in this horrific case study. When websites are not safe about their use of credit card numbers, it can have horrible impacts such as this man losing his $250,000 a year job and becoming estranged from his family, when they thought he bought child pornography.
1More

Learning the Importance of Computer Ethics - 0 views

  •  
    Computer Ethics is a big focal area at Pioneer Middle School. This link provides a whole unit of information on cyberethics for kids, complete with four different tasks and a downloadable task sheet. As part of the unit, students created their own ethics quizzes and they are posted on line .
1More

Windows: Safe Computing Tools for Kids - 0 views

  •  
    On today's Tekzilla Daily, Veronica shows you how to make the most of Vista's built-in tools to help make sure your offspring don't veer too far off track in their computing habits
1More

Ten Commandments for Computer Ethics - 1 views

  •  
    Courtesy of the Computer Ethics Institute.
2More

Schools Left in the Dust on the Social Media Highway - 4 views

  • "Our computer use policy is extensive. The frame is this is how you will use the computers when you are here, you can't go on these sites and do these things while you're at school, but when they get out from school and start using computers of their own to do some of these things, then it becomes a little bit more clouded," he said.
  • The problem NEOLA faces is a lack of law to base policies on regarding student and staff use of Facebook, Myspace, Twitter, etc. In turn, there are no policies for district administrators to follow, leaving a gray area for disciplinary issues. State legislature was passed regarding bullying, so NEOLA set policies based on that, but in terms of writing policy on technology, direction is what NEOLA is lacking.
2More

Cyber bullies run amok at top school - 0 views

  • PARENTS have been urged to confiscate their children's mobile phones at night and monitor computer use after two year 9 students from the prestigious Sydney girls' school Ascham were forced to leave the school because of cyber-bullying.
  •  
    Parents have been urged to confiscate their children's mobile phones at night and monitor computer use after two year 9 students from the prestigious Sydney girls' school Ascham were forced to leave the school because of cyber-bullying.
1More

Ten Commandments of Computer Ethics - 1 views

  •  
    Written by the Computer Ethics Institute or Computer Professionals for Social Responsibility
3More

NECC 2009 will explore students' roles in a digital world - 0 views

  • Attendees at the 2009 National Educational Computing Conference (NECC) will examine what it means to live in a digital world, and will discuss the best ways to prepare students to become global citizens.
  • "How do we prepare students for living and working in a global society and increasingly complex world? What new knowledge and skills are needed for productive collaboration in the 21st century?  And what types of learning environments foster the development of those skills?"
  •  
    Attendees at the 2009 National Educational Computing Conference (NECC) will examine what it means to live in a digital world, and will discuss the best ways to prepare students to become global citizens.
2More

Facebook friend saves suicidal teen on other side of the Atlantic - 0 views

  • A schoolboy who announced his imminent suicide on Facebook was saved when a friend across the Atlantic in America read his threat and raised the alarm.The 16-year-old, from Oxford, sent a late-night message on the social networking website to a girl sitting 3,400 miles away at her computer in Maryland. The teenager had been speculating about taking his life and shortly before 11.30pm on Wednesday wrote: ‘I’m going away to do something I’ve been thinking about for a while then everyone will find out.’
  •  
    A schoolboy who announced his imminent suicide on Facebook was saved when a friend across the Atlantic in America read his threat and raised the alarm. The 16-year-old, from Oxford, sent a late-night message on the social networking website to a girl sitting 3,400 miles away at her computer in Maryland.
1More

Buy Shopify Accounts - 100% Best Quality Buy Or Sell Account - 0 views

  •  
    If you're looking to begin an online commerce, chances are you've listened of Shopify. But you may be pondering - what precisely is a Shopify account? Basically, a Shopify account is your door to making and overseeing your online store on the Shopify stage. It permits you to set up your store, customize your location, oversee stock, handle orders, and more. With a Shopify account, you have get to to a assortment of devices and highlights that make it simple to dispatch and develop your e-commerce business. Buy Shopify Accounts Are Shopify accounts secure? As online shopping proceeds to develop in ubiquity, it's vital for both customers and businesses to prioritize security when it comes to online exchanges. With the rise of e-commerce stages like Shopify, numerous trade proprietors are turning to these stages to make their online stores. Be that as it may, with the delicate data put away on these stages, the address emerges: Are Shopify accounts secure? In this article, we will investigate the different security measures in put to ensure Shopify accounts and the steps both businesses and customers can take to assist secure their online transactions. In later a long time, cyber assaults and information breaches have ended up all as well common, making it vital for businesses to take proactive measures to defend their online nearness. Shopify, as a driving e-commerce stage, has actualized a number of security highlights to secure accounts and client information. From encryption of touchy data to two-factor verification, Shopify endeavors to give a secure environment for online exchanges. In spite of these measures, it is still critical for trade proprietors to remain watchful and frequently audit their security settings to guarantee their information is protected. Buy Shopify Accounts What are the benefits of having a Shopify account? Having a Shopify account comes with a plenty of benefits that can raise your online trade to unused statures. One of the maj
1More

Tuned into Tech Internet Safety Webquest - 1 views

  •  
    Title: Tuned into Tech Internet Safety Webquest Description: The internet is a powerful tool that allows you to communicate, gather information, network, publish and share resources. However, when not used cautiously or properly, the internet can expose you to ill-intentioned strangers, inappropriate content, computer viruses and cyber-bullying. This webquest will help you gather information about being safe while using the internet. Grade Level: 6-8 Curriculum: Technology Keywords: Internet, safety, cyberbullying, privacy
5More

Cell Phone Safety - 0 views

  • The fact that cell phones pose a great risk when combined with driving cannot be of any surprise to anyone. Let’s face it. First, drivers must take their eyes off the road while dialing. Second, people can become so absorbed in their conversations or other cell phone use that their ability to concentrate on the act of driving is severely impaired, jeopardizing the safety of vehicle occupants and pedestrians alike.
  • Time Away from Homework. Technology affords teens (and adults) a host of ways to do something other than what they are supposed to, in this case homework.
  • Mounting Minutes ($$$) Since consumers must be 18 in order to purchase a cell phone contract in the United States, most parents are buying the phones their children carry. This is good news because parents can choose a plan that fits how the cell phone will be used and can review monthly cell phone bills which typically includes a log itemizing phone activity. However, problems still exist. For one, children can quickly go over their allotted minutes for the month which can leave their parents with bills that can easily approach hundreds of dollars for the month.
  • ...1 more annotation...
  • Cell Phones and Gaming According to Sullivan (2004)3, when cellular phone games were simple, such as the knockoffs of the Atari-era "Breakout," there wasn't much to worry about. But newer phones with color displays and higher processing power create a landscape that might make some parents worried about what their kids are playing on the bus home from school.
  •  
    Today's cellular phones (cell phones) are more than just phones, they are hightech appliances that also serve as a mini-computers. Cell phones are electronic gadgets that allow users to surf the web, conduct text chats with others, take photos, record video, download and listen to music, play games, update blogs, send instant text messages to others, keep a calendar and to-do list, and more, much more. But cell phones also carry risks and cause distractions.
3More

High Maintenance : 1:1 Laptop Programs - 0 views

  • FEW DISTRICTS HAVE MORE MILES on their 1-to-1 computing initiatives than Texas' Irving Independent School District, where the teachers have had laptops since 1996 and the current student program began with a pilot launched in 2001. Today, the Irving 1-to-1 program puts close to 12,000 laptops in the hands of students and teachers throughout the district.
  • After nearly a decade, Owen and her team have learned a few things about maintaining 1-to-1 computer programs in K-12 environments. The cornerstone of her strategy: personnel. Owen keeps two technicians on duty at the 1-to-1 high school campuses, and one at every other campus. On top of that, the district employs a central team of five technicians whose job it is to resolve problems that people at the campus level can't handle.
  •  
    Running a successful 1-to-1 program requires diligent upkeep-- along with a few veteran tricks of the trade.
1More

Cyberbullying - Bullying Beyond the Schoolyard [New Book] - 0 views

  •  
    Teens and tweens have been bullying each other for generations. The bullies of today, however, have the advantage of utilizing technology such as computers, cell phones and other electronic devices to inflict harm on others. "Bullying Beyond the Schoolyard: Preventing and Responding to Cyberbullying," due out this month, uncovers the types of youth most susceptible, how they felt, who they told, how they coped and how it affected their lives, and illustrates the gravity of cyberbullying and its real-world repercussions. The co-authors, [Justin Patchin, Ph.D. and Sameer Hinduja] both have backgrounds in Criminal Justice and are university-based. Their web site, Cyberbullying.Us is dedicated to identifying the causes and consequences of online harrassment.
5More

New York State: Scrambling for solutions to cyberbullying - 0 views

  • Both the state Senate and Assembly have proposed anti-cyberbullying laws. Kathy Wilson of Sen. Carl Marcellino's (R-Syosset) office said that the Senate has proposed two bills in the last two years that add computers to the list of modes of illegal harassment, but the Assembly passed neither.The Assembly's website states that the Assembly has proposed bills "to define and prohibit the bullying, cyberbullying and hazing of students and others on school property" as well as to add a database for reporting such complaints, but has not passed either yet.
  • Both the state Senate and Assembly have proposed anti-cyberbullying laws. Kathy Wilson of Sen. Carl Marcellino's (R-Syosset) office said that the Senate has proposed two bills in the last two years that add computers to the list of modes of illegal harassment, but the Assembly passed neither.
  • The Assembly's website states that the Assembly has proposed bills "to define and prohibit the bullying, cyberbullying and hazing of students and others on school property" as well as to add a database for reporting such complaints, but has not passed either yet.
  • ...1 more annotation...
  • Matuk said that the task of monitoring children's electronic activities has been complicated by such devices as iPhones, from which I.M.s can be sent from anywhere. "This is going to require partnership between the schools and the community," he added.
  •  
    Schoolyard bullies are a long-standing problem but now, in the age of the Internet, they are increasingly using electronic devices to torment their victims. Because cyberbullying has become so prevalent, several states, including New York, have proposed legislation to control cyberbullying.
4More

SB 818: Missouri Governor Signs Cyber-Bullying Bill into Law - 0 views

  • The Governor signed the bill at a library in St. Charles County, not far from the neighborhood where a 13-year-old girl, Megan Meier, hanged herself in 2006 after receiving taunting messages over the Internet.  The law was passed after the national outcry that followed the suicide of Meier
  • When the full story came to light, and public demand grew for the mother's prosecution, it turned out that what Ms. Drew had done, while clearly malicious, was not against the law as the Missouri Statutes were then written. So the Missouri Legislature and Governor Blunt decided to correct this problem. The new law adds to unlawful harassment electronic means of communication.
  • The new law penalizes those who knowingly communicate with another person who is, or who purports to be, seventeen years of age or younger and recklessly frightens, intimidates, or causes emotional distress to such other person.  Also, the new law makes it a crime "to engage, without good cause, in any other act with the purpose to frighten, intimidate, or cause emotional distress to another person, cause such person to be frightened, intimidated, or emotionally distressed, and such person's response to the act is one of a person of average sensibilities considering the person's age."
  •  
    On June 30th, Missouri governor, Matt Blunt, signed a bill updating state laws against harassment by removing the requirement in the legislation requiring that such harassing communication be written or made over the telephone. Now, harassment from computers, text messages and other electronic devices may also be considered illegal. The amended law also requires school boards to create a written policy requiring schools to report harassment and stalking committed on school property to local police, including such done via the Internet.
‹ Previous 21 - 40 of 135 Next › Last »
Showing 20 items per page