Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items matching ""Internet Safety"" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
1More

Literacy with ICT Blog » Blog Archive » A Common Sense Approach to Internet S... - 1 views

  •  
    A common sense approach to cybersafety
7More

Ideas and Thoughts from an EdTech [Blog Archive] - 0 views

  • Her reaction was to block all these sites, ban her daughter from the home computer and demand the school district to install content filtering that would prohibit any access to social networks.
    • Rafael Ribas
       
      Exactly the kind of reaction an uneducated parent would have - away from my child!
  • social networking should be taught in the homes
  • Teachers are our best filters at school
    • Rafael Ribas
       
      Hear hear! That is exactly what we need to say loud and clear
  •  
    Very interesting post by Dan Shareski on the connections between parents, school districts, students and the internet.
  •  
    podcast outlining a parent's fears about non filtering of Facebook at school
1More

Second Life could sexually exploit children via Internet - 0 views

  •  
    With nearly 13 million online users, the rapidly expanding virtual world Second Life is a risk for children, who could be sexually exploited, U.S. Rep. Mark Kirk (R-Ill.) said Monday."This Second Life is a new scare, unchartered territory," Wilks said at a news conference Monday with Kirk at the Mt. Prospect Police Department. "It hits home." Kirk said he knew of no cases in which children were targeted by sexual predators on Second Life, but he said he considers the virtual world an emerging danger.
1More

Parents are in the Dark: What Kids Really Do Online - 1 views

  •  
    U.S. moms and dads estimate that their children spend only two hours a month on the internet, but kids say they actually spend 10 times more time - or 20 hours - according to a recent study, the first Norton Online Living Report by Symantec (via MarketingCharts). 41% of respondents age 13-17 say their parents have no idea what they do online, and only 33% of parents worldwide say they set parental controls and monitor their children's online activities.
1More

Strategies for Schools in the Age of the Social Web - 0 views

  •  
    Cybersafety expert and Internet Law Attorney, Nancy Willard, has some ideas for schools as they develop and adapt safety strategies to address Web 2.0. She also offers some questions that school staff can discuss to assess and improve the manner in which they are addressing these issues in their building:
1More

Obstacles to Opportunities: "Acceptable Use and the Web 2.0" - 0 views

  •  
    Presentation at the K-12HSN Conference Online by Joseph Bires. A discussion of how the use of Web 2.0 technologies has challenged and changed the concept of acceptable use. The presenter suggests ways to balance protecting students, teachers, and schools from the dangers of the Internet, while still integrating Web 2.0 technologies into the K-12 curriculum. Also, philosophical issues of acceptable use are discussed such as identity and transparency. Finally, practical suggestions are shared to help every teacher and administrator. This talk is available as an MP3 audio file and an audiofile blog.
1More

Ghosts in the Browser: Computer and Network Security - 1 views

  •  
    Rising concerns about computer security are evident in the San Jose Mercury News three-part series which focused on everything from phishing schemes and identity theft to student safety on the Internet. In many districts, technology directors are finding they have to do more and more to insure that data is not compromised and to see that students are not using school networks to access inappropriate content.
    Part I: How online crooks put us all at risk
    Part II: How well are we protecting ourselves?
    Part III: U.S. targets terrorists as online thieves run amok

1More

Schools caught in internet safety dilemma [eSchool News, Nov. 17, 2008] - 0 views

  •  
    Solutions such as eGuardian could provide greater protection for kids, but at what cost (e.g., market profiling)?
3More

Flickr Perversion - 1 views

  • These photos of these girls were without a doubt being sexualized, and my four-year-old daughter was amongst these images.
  •  
    This is why I don't share the photos of my children online in public places. After one pic of a child at school was favorited in this way, I took the pic down and am ridiculously vigilant about checking to see how many photos have been favorited and which ones to see if there is one that some sicko has looked at. This is an article I'm going to share with my digiteen dream team! It is an important one to share!
  •  
    In January 2009, Alex Couros received an email notice saying that a few of his Flickr photos had been favorited. These particular photos were of his children, mostly of his daughter. Every time this happens, he goes to see who the Flickr user is, and most of the time, it is a family member, a close friend, or someone he know through Twitter (or other social network). He did not recognize the user in this particular case, and when he went to see their photos, the Flickr message alerted him that none of the user's photos were available. Seeing as his photos had been favorited, he went to see what other photos had been marked as favorites by this user.
1More

Technology: Cyber Security - 0 views

  •  
    Teaching cyber security with a focus on safety and ethics has grown rapidly in importance over the past few years. Securing your personal computer and protecting classroom computers plays a crucial role in protecting our nation's Internet infrastructure.
1More

Keeping Children Safe on the Internet - 0 views

  •  
    Advice for parents from the National Association of School Psychologists.
1More

A Common Sense Approach to Internet Safety - 0 views

  •  
    The folks at Common Sense Media in San Francisco created this video in partnership with Google [Feb 08]. You may find it elsewhere on YouTube but this is the original version and if you're showing it to a parent group at a school where YouTube is blocked, this is a better option. You can click on it and it will enlarge to full screen.
11More

Search and Seizure of Cell Phones: Can You Hear Me Now? - 0 views

  • May school officials lawfully “search” the confiscated cell phone to look at stored text messages, photographs, videos, and logs of incoming and outgoing calls? Clearly, the circumstances of the search must satisfy the T.L.O. standard. Not as clear, however, is whether such a search violates federal or Michigan laws regarding stored electronic communications.
  • [A] search of a student by a teacher or other school officials will be ‘justified at its inception’ when there are reasonable grounds for suspecting that the search will turn up evidence that the student has violated or is violating either the law or the rules of the school. Such a search will be permissible in its scope when the measures adopted are reasonably related to the objectives of the search and not excessively intrusive in light of the age and sex of the student and the nature of the infraction.”
  • In Klump v Nazareth Area Sch Dist, 425 F Supp 2d 622 (ED Pa, 2006), a federal district court denied the school’s motion to dismiss a lawsuit filed by a student whose cell phone was searched.
  • ...5 more annotations...
  • compensatory and punitive damages for the alleged unconstitutional search, violation of the Pennsylvania Wiretapping and Electronic Surveillance Control Act, invasion of privacy, and defamation.
  • The court ruled that the student had stated a claim for the alleged violation of his right to be free from an unreasonable search.
  • here was no basis for them to search the text and voice mail messages stored on the phone.
  • unlawful access to the stored voice mail and text message communications.
  • (2) A person shall not willfully and maliciously read or copy any message from any telegraph, telephone line, wire, cable, computer network, computer program, or computer system, or telephone or other electronic medium of communication that the person accessed without authorization. (3) A person shall not willfully and maliciously make unauthorized use of any electronic medium of communication, including the internet or a computer, computer program, computer system, or computer network, or telephone.
  •  
    Legal Implications for Searching Student Cell Phones. Although this article is written against Michigan law, it does help clarify some of the concepts for what is permissable. Note that searching a student's cell phone or wireless device without parent permission may violate state wiretapping laws.
  •  
    Confiscating and looking at information on cell phones by school officials is still not clear. This is a very interesting case study for those working with digital citizenship issues at their school.
  •  
    Fascinating article explaining Michigan take on searching and confiscating cell phones.
2More

Cybersmart Detectives - 0 views

  •  
    These Internet safety links from Australia and over 75 other links to cybersafety agencies can be found at CTAP4's Directory of Cybersafety Education Agencies
  •  
    Cybersmart kids is a community awareness project developed by the Australian Communications and Media Authority (ACMA). The site contains cyber rules, chat rules and mobile rules for kids as well as links to safe sites. Australian schools can also register for access to the online game, Cybersmart Detectives, in which players learn about managing bullying behaviors both offline and online.
1More

OpenDNS | Providing A Safer And Faster Internet - 0 views

  •  
    Community 'moderated' DNS level web filter applied to broadband router sure keeps pc-offspring-'hackers' well filtered (until they discover reset button on router -- mmm perhaps keeping broadband provider instructions for router somewhere safe would be a good idea).
1More

Protecting Students in the 21st Century [Video] - 3 views

shared by Anne Bubnic on 08 Mar 10 - Cached
  •  
    From Simple K-12: Six hours of online curriculum for teens and teachers, designed to meet technology plan goals and government mandates. Includes 29 online lessons that can be customized by each teacher. Six hrs of Internet Safety curriculum with optional assessments and quizzes to measure student understanding of material.
2More

Bullying Policy at Hudson Area School District - 0 views

  • Bullying or other aggressive behavior toward a student, whether by other students, staff, or third parties, including Board members, parents, guests, contractors, vendors, and volunteers, is strictly prohibited. This prohibition includes physical, verbal, and psychological abuse, including hazing, gestures, comments, threats, or actions to a student, which cause or threaten to cause bodily harm, reasonable fear for personal safety or personal degradation. Demonstration of appropriate behavior, treating others with civility and respect, and refusing to tolerate harassment or bullying is expected of administrators, faculty, staff, and volunteers to provide positive examples for student behavior. This policy applies to all activities in the District, including activities on school property, in a school vehicle, and those occurring off school property if the student or employee is at any school-sponsored, school-approved or school-related activity or function, such as field trips or athletic events where students are under the school’s control, or where an employee is engaged in school business. Misconduct occurring outside of school may also be disciplined if it interferes with the school environment. "Bullying" is any gesture or written, verbal, graphic, or physical act (including electronically transmitted acts – i.e. internet, telephone or cell phone, personal digital assistant (PDA), or wireless hand held device) that is reasonably perceived as being motivated either by any actual or perceived characteristic, such as race, color, religion, ancestry, national origin, gender, sexual orientation, gender identity and expression or a mental, physical, or sensory disability or impairment; or by any other distinguishing characteristic. Such behavior is considered harassment or bullying whether it takes place on or off school property, at any school-sponsored function, or in a school vehicle.
  •  
    Includes a clause for cyberbullying.
1More

Phishing Scams in Plain English [Common Craft Video] - 1 views

  •  
    A short guide to recognizing and avoiding email phishing scams.
1More

Parental Control Product Guide 2010 [pdf] - 1 views

  •  
    Parental controls provide one or more of five main functions: content filtering; use restrictions; contact management; privacy protections; and monitoring. This guide provides helpful info for parents on controls for Internet, Mobile Phones, Gaming Consoles and Media Players.
« First ‹ Previous 241 - 260 of 276 Next ›
Showing 20 items per page