Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items matching "this" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
26More

Online Predators and Their Victims - 0 views

  • My (Liz B. Davis ) Summary of Key Points (All are quotes directly from the article): Online "Predators" and Their Victims. Myths, Realities, and Implications for Prevention and Treatment. by: Janis Wolak, David Finkelhor, and Kimberly J. Mitchell - University of New Hampshire and Michele L. Ybarra - Internet Solutions for Kids, Inc.
  • The publicity about online"predators" who prey on naive children using trickery and violence is largely inaccurate.
  • adult offenders who meet, develop relationships with, and openly seduce underage teenagers
  • ...21 more annotations...
  • In the great majority of cases, victims are aware they are conversing online with adults. In the N-JOV Study, only 5% of offenders pretended to be teens when they met potential victims online. (112)
  • Offenders rarely deceive victims about their sexual interests.
  • promises of love and romance
  • 99% of victims of Internet-initiated sex crimes in the N-JOV Study were 13 to 17 years old, and none were younger than 12. 48% were 13 or 14 years old. (115)
  • it was those 15-17 years of age who were most prone to take risks involving privacy and contact with unknown people. (115)
  • take place in isolation and secrecy, outside of oversight by peers, family  members, and others in the youth's face-to-face social networks (115)
  • Most of the online child molesters described in the N-JOV Study met their victims in chatrooms. In a 2006 study, about one third of youths who received online sexual solicitation had received them in chatrooms. (116)
  • Youth internet users with histories of offline sexual or physical abuse appear to be considerably more likely to receive online aggressive sexual solicitations. (117)
  • ..Although Internet safety advocates worry that posting personal information exposes youths to online molesters, we have not found empirical evidence that supports this concern. It is interactive behaviors, such as conversing online with unknown people about sex, that more clearly create risk. (117)
  • Online molesters do not appear to be stalking unsuspecting victims but rather continuing to seek youths who are susceptible to seduction. (117)
  • maintaining online blogs or journals, which are similar to social networking sites in that they often include considerable amounts of personal information and pictures, is not related to receiving aggressive sexual solicitation unless youths also interact online with unknown people. (117)
  • Boys constitute 25% of victims in Internet-initiated sex crimes, and virtually all of their offenders are male. (118
  • Some gay boys turn to the internet to find answers to questions about sexuality or meet potential romantic partners, and there they may encounter adults who exploit them. (118)
  • ..child molesters are, in reality, a diverse group that cannot be accurately characterized with one-dimensional labels. (118)
  • Online child molesters are generally not pedophiles. (118)Online child molesters are rarely violent. (119)
  • Child pornography production is also an aspect of Internet-initiated sex crimes. One in five online child molesters in the N-JOV Study took sexually suggestive or explicit photographs of victims or convinced victims to take such photographs of themselves or friends. (120)
  • Youths may be more willing to talk extensively and about more intimate matters with adults online than in face-to-face environments. (121
  • it may not be clear to many adolescents and adults that relationships between adults and underage adolescents are criminal. (122)
  • Simply urging parents and guardians to control, watch, or educate their children may not be effective in many situations. The adolescents who tend to be the victims of Internet-initiated sex crimes many not themselves be very receptive to the advice and supervision of parents. (122)
  • We recommend educating youths frankly about the dynamics of Internet-initiated and other nonforcible sex crimes. Youths need candid, direct discussions about seduction and how some adults deliberately evoke and then exploit the compelling feelings that sexual arousal can induce. (122)
    • anonymous
       
      Let's remember that although there are direct references to gay and male pedophiles of gay boys, that 99% of child sex offenders identify as heterosexual, online or offline.
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing This together with Diigo.
  •  
    This research article has the facts about sexual predatory behavior.
1More

Learning Cyberlaw in Cyberspace - 0 views

  •  
    This site provides reading materials for students studying the law as it applies to activities in cyberspace. The reading materials include edited cases, statutes, treaties, and law review articles, as well as content written by the individual module authors. Some have likened the study of cyberspace law to trying to board a moving bus. Given the pace of change in This field any attempt at a traditional casebook would largely be outdated before it reached the hands of the students. This site is designed to take advantage of the hypertext media offered by the world wide web by providing reading modules that can be altered or replaced as the law changes.
2More

ChatRoulette: Devil Incarnate or Accessible Public? - 1 views

  • Don't get me wrong: There is a high probability that you will run into the seedier side of the site in a matter of moments.  Some have argued that ~10% of the site's users are exposing themselves or their genitals through the site.  And, unlike pornographic spam, these exhibitionists are typically male.  
  •  
    It's easy to see new Internet phenomena and panic, especially when the technology in question opens up a portal to all of the weird parts of the Internet. This is precisely what is happening around ChatRoulette, a new peer-to-peer webcam-based video chat site. Although the site was built by a 17-year-old Russian high school student to connect with other teens, nearly every adult who has visited the site runs screaming that This is a terrible space for young people. In some senses, they're right. But the more that they panic and talk about how bad This is for teens, the more teens get curious and want to check it out. The result? A phenomenon generated through fear.
1More

Kelly and John Halligan Share Their Son's Story [Video] - 0 views

  •  
    This is not the usual Ryan Halligan video that shows up all over the Internet. This particular story was recorded for the Oprah Show by Harpo Productions. Ryan's dad always speaks with such painful and raw emotion about This tragic story.
1More

Five Ideas for Making a Purposeful and Professional Digital Footprint - 0 views

  •  
    Five ideas to enable educators to develop and model a purposeful and professional digital footprint.\n\n1-Model responsible footprinting with your own practices in blogging, commenting, social networking, and picture posting.\n2-If you have established a professional blog, share it widely and proudly such as placing it in your email signature (if your employer will let you) and as Jeff Utecht suggests include your blog url when you comment on others blogs and in other forums. This enables others to see best practices and is a great way to get the conversation started.\n3-Google yourself (aka ego surfing). If you have something posted online that you'd be uncomfortable having a current or future student, parent, colleague, or employer find, delete it (if you can) or request that it be deleted. There are ways an aggressive internet detective can still find This information, but most won't go through the trouble and the mere fact that you deleted it shows some level of responsibility.\n4-If you do have online personal information and/or interests you wouldn't want discovered, use an unidentifiable screen name/avatar. This means you may need to update your screen name/avatar in your existing online presence.\n5-Engage in the conversation and professionally comment, reply, and present online, onsite, and at conferences.
1More

Product Review: Digital Cameras at a Glance - 0 views

  •  
    The first camera we will examine is the Olympus Stylus TOUGH TG-4 . This camera is the definition of durable. It is waterproof up to 50 feet, freeze proof to 14 degrees Fahrenheit, shock proof to 7 feet, and crush/smash proof up to 221 pounds - making it durable to the almost maximum. Durability is important and is something This camera possesses, but some other features it holds are the high-definition video capability, RAW image and Live Composite modes, Wi-Fi and GPS capabilities, wide-angle zoom, and a f2.0 speed lens, making This camera not only durable, but a testament to its name.
1More

Smart Keyboard For Ipad 7th Generation - 0 views

  •  
    Been using Smart Keyboard For Ipad 7th Generation for a week, will update the review with durability and longevity comments after more time has passed… Felt like nobody mentions some things that are worth knowing… There are magnets in places that make this thing more functional than they tell you. You can wrap the cover to the backside of the iPad and use it as you would normally, and magnets will hold it in place. When you use it as a stand, you can use it like a tilted drawing pad. Magnets will hold it in this position so it's actually fairly secure. If you're opening it or changing the configuration, magnets hold the keyboard in, so you can treat it exactly like a regular smart cover without the keyboard annoyingly flopping out. And finally, you don't have to worry about accidentally pressing keyboard buttons when it's in any position other than "laptop mode." The magnets let it know and the keyboard won't function unless it's specifically in this mode. Would have bought it sooner had I known, instead of just taking a chance.
1More

Best Bamboo Cheese Board - 0 views

  •  
    My wife and I love having Best Bamboo Cheese Board and wine dates!! We usually cut up some cheese and put it on an ugly plastic board. This works great for us but looks kinda tacky when we have guests. So as we are getting into the busy football season and we have a lot of friends come over, I wanted something that looked a little more attractive. So I purchased This set! The set is a nice 13×13 cutting board with a built-in hidden cabinet for utensils. The utensils are a fork, a knife, a flat edge knife, and a sharp spatula. Each one of them is very sharp and can easily cut through hard cheese like cheddar. They all have a nice comfortable bamboo handle. The bottom part of the cutting board has a nice grippy bottom too, This will prevent sliding around and will allow the drawer to slide out smoothly.
2More

Buy North Carolina Driver's License - Buy genuine driving licence online - 0 views

  •  
    North Carolina Driver's License for sale - Buy genuine driving licence Are you looking to buy a North Carolina driver's license online? Do you need a driving grant in North Carolina? Have you been attempting to venture out to North Carolina? Do you need archives you cannot have? You are in the perfect spot at the perfect time if your answer is Yes. As the most renowned fake driver's license for sale online in North Carolina, UK, and Europe, we have a team of most competent, experienced and skilled employees who know how to recreate the exact features in the same way as the Department of Motor Vehicles (DMV) performs. If you are searching for the best place to get a fake driver's license online for North Carolina, UK, and Europe, look no farther than realcounterfeitsmoney.com Separate technicians are assigned to recreate different state and country license. When you buy fake IDs online for North Carolina, UK, and Europe, you find a special team entrusted with the task of creating a fake license. Reasons why you need to get a Driver's License online from us At realcounterfeitsmoney, we produce both Registered and Unregistered North Carolina Driver's License. Registered Driver's License: For the enlisted North Carolina DL, we register all your data into the North Carolina information base framework. Whenever checked to utilize an information understanding machine, your subtleties will obviously appear in the framework %100 genuine. Consequently, you will have the option to legitimately utilize it anyplace since it has no distinction with the one given by the legislature. Unregistered Driver's License: we additionally produce an unregistered North Carolina Driver's License that looks precisely like the enrolled duplicate yet no data enlisted in the information base. The report will be second hand. All mystery highlights of the government-provided visa will be copied and engraved on this Fake duplicate. We generally encourage our customers to let
  •  
    North Carolina Driver's License for sale - Buy genuine driving licence Are you looking to buy a North Carolina driver's license online? Do you need a driving grant in North Carolina? Have you been attempting to venture out to North Carolina? Do you need archives you cannot have? You are in the perfect spot at the perfect time if your answer is Yes. As the most renowned fake driver's license for sale online in North Carolina, UK, and Europe, we have a team of most competent, experienced and skilled employees who know how to recreate the exact features in the same way as the Department of Motor Vehicles (DMV) performs. If you are searching for the best place to get a fake driver's license online for North Carolina, UK, and Europe, look no farther than realcounterfeitsmoney.com Separate technicians are assigned to recreate different state and country license. When you buy fake IDs online for North Carolina, UK, and Europe, you find a special team entrusted with the task of creating a fake license. Reasons why you need to get a Driver's License online from us At realcounterfeitsmoney, we produce both Registered and Unregistered North Carolina Driver's License. Registered Driver's License: For the enlisted North Carolina DL, we register all your data into the North Carolina information base framework. Whenever checked to utilize an information understanding machine, your subtleties will obviously appear in the framework %100 genuine. Consequently, you will have the option to legitimately utilize it anyplace since it has no distinction with the one given by the legislature. Unregistered Driver's License: we additionally produce an unregistered North Carolina Driver's License that looks precisely like the enrolled duplicate yet no data enlisted in the information base. The report will be second hand. All mystery highlights of the government-provided visa will be copied and engraved on this Fake duplicate. We generally encourage our customers to let

Housnat juicer for whole fruit - 0 views

started by wasifali on 03 Jul 23 no follow-up yet

Housnat juicer for whole fruit - 0 views

started by wasifali on 03 Jul 23 no follow-up yet
4More

Digital Lifestyle Youth Culture Profile Report 2008 - 0 views

  • For example, miniDV cameras are not only among the new tools of self-expression, but the very act of creating personal videos with friends and creating events and key themes to shoot have become key aspects of entertainment in and of itself. To this generation, playing music via your cell phone, and movies and TV shows via your iPod are a given. Emailing is considered too old-school by many, whereas texting is outpacing cell phone calls. These things also go hand-in-hand with changes in online shopping patterns, top website preferences, communication and blogging patterns, and new habits for using social networks—not to mention the tremendous changes in preferred social networks and profile page usage patterns in general. These things are changing the paradigm of how the businesses of entertainment, communication, retail, marketing, advertising, and branding have been done in the past.
  • Unfortunately, as more companies pour big money into expanding their new media marketing components, as many people have discovered, the Field of Dreams theory (“if we build it, they will come”) certainly doesn’t apply when it comes to reaching savvy youth today. Popping up a site (or social network for that matter) no matter how cool it is means nothing if you can’t reach the market it’s intended for. This Report, therefore, also includes a great deal about how young people find out about new websites, communicate with others, and other forms of grassroots networking.
  • Overall, the Digital Lifestyle Youth Culture Profile Report 2008 not only reveals traits by target demographics, but also the growing generation gap occurring even within this generation.
  •  
    [Market Research Report]

    "Young people are the inherent trend leaders when it comes to new technology and usage patterns, and are the ones pushing forward the speed of change in communication and information technology. This Report reveals that it may be imperative for some brands to re-think strategies--even among progressive companies--if they are to reach youth culture effectively.
6More

Messaging Shakespeare | Classroom Examples | - 0 views

  • Brown's class was discussing some of the whaling calculations in Moby Dick. When one student asked a question involving a complex computation, three students quickly pulled out their cell phones and did the math. Brown was surprised to learn that most cell phones have a built-in calculator. She was even more surprised at how literate her students were with the many functions included in their phones. She took a quick poll and found that all her students either had a cell phone or easy access to one. In fact, students became genuinely engaged in a class discussion about phone features. This got Brown thinking about how she might incorporate This technology into learning activities.
  • Brown noticed that many students used text messaging to communicate, and considered how she might use cell phones in summarizing and analyzing text to help her students better understand Richard III. Effective summarizing is one of the most powerful skills students can cultivate. It provides students with tools for identifying the most important aspects of what they are learning, especially when teachers use a frame of reference (Marzano, Pickering, & Pollock, 2001). Summarizing helps students identify critical information. Research shows gains in reading comprehension when students learn how to incorporate isummary framesi (series of questions designed to highlight critical passages) as a tool for summarizing (Meyer & Freedle, 1984). When students use this strategy, they are better able to understand what they are reading, identify key information, and provide a summary that helps them retain the information (Armbruster, Anderson, & Ostertag, 1987).
  • Text messaging is a real-world example of summarizing—to communicate information in a few words the user must identify key ideas. Brown saw that she could use a technique students had already mastered, within the context of literature study.
  • ...2 more annotations...
  • To manage the learning project, Brown asked a tech-savvy colleague to help her build a simple weblog. Once it was set up, it took Brown and her students 10 minutes in the school's computer lab to learn how to post entries. The weblog was intentionally basic. The only entries were selected passages from text of Richard III and Brown's six narrative-framing questions. Her questions deliberately focused students' attention on key passages. If students could understand these passages well enough to summarize them, Brown knew that their comprehension of the play would increase.
  • Brown told students to use their phones or e-mail to send text messages to fellow group members of their responses to the first six questions of the narrative frame. Once this was completed, groups met to discuss the seventh question, regarding the resolution for each section of the text. Brown told them to post this group answer on the weblog.
  •  
    Summarizing complex texts using cell phones increases understanding.
6More

The Associated Press: Video of Teen Beating Raises Questions - 0 views

  • But that doesn't mean YouTube or any other media company should get the blame, legally or ethically, for the attack, media experts said Friday.
  • The teenagers have been arrested on charges that they beat the teen so they could make a video of the attack to post online. One of the girls struck the 16-year-old victim on the head several times and then slammed her head into a wall, knocking her unconscious, according to an arrest report.
  • From a legal standpoint, YouTube and other online service providers are largely exempt from liability because of a 1996 anti-pornography law. One provision says Internet service providers are not considered publishers simply because they retransmit information provided by their users or other sources.
  • ...1 more annotation...
  • "There is no legal reason this video cannot be shown. It is obviously distasteful, abhorrent what the teenagers did to the victim, but it doesn't really make sense (to ask), 'Should YouTube have taken it down?'" Morris said.
  •  
    It is very important to review this case and learn what can happen to prevet this sort of behavior.
  •  
    This horrific attack that was videoed and posted on youtube for attention brings many questions and the public spotlight again goes onto the digital world we are creating. It is making its own "rules" which really aren't any. It is time for educators to speak out or be spoken to about what to or not to do.
3More

Web Etiquette and Safety Lesson Plan [Assessment Piece] - 0 views

  • A person is on the other end of all web communication. The web connects people in a community where everyone becomes each other's neighbor. It is just as important to observe safety on the Internet as it is to follow traffic signs. The Think.com community is a place where the teacher sees everything. Everyone is responsible for his/her own actions while in Think.com. Passwords are to be kept secret.
    • Vicki Davis
       
      Excellent concluding concepts for an introductory course for young students. How many don't understand this!
  •  
    Appropriate web etiquette (netiquette) and web safety are vital for building a strong web community. This is a lesson plan that teachers can use to introduce key concepts to their students as they introduce them to the Think.com community. Use This model lesson as designed, change it to fit your needs, or create your own.
10More

Technology Integration Matrix - 0 views

  • The Technology Integration Matrix (TIM) illustrates how teachers can use technology to enhance learning for K-12 students. The TIM incorporates five interdependent characteristics of meaningful learning environments: active, constructive, goal directed (i.e., reflective), authentic, and collaborative (Jonassen, Howland, Moore, & Marra, 2003). The TIM associates five levels of technology integration (i.e., entry, adoption, adaptation, infusion, and transformation) with each of the five characteristics of meaningful learning environments. Together, the five levels of technology integration and the five characteristics of meaningful learning environments create a matrix of 25 cells as illustrated below.
  • Levels of Technology Integration into the Curriculum
  • Basic technology skills and integration of technology into the curriculum go hand-in-hand to form teacher technology literacy.
    • Chris Hoelzer
       
      To often we ask teachers to impliment technology tools without the proper explanation or PD.
  • ...2 more annotations...
  • professional development planning and needs assessment resource
  • evaluate teachers’ current levels of proficiency with technology
  •  
    Technology integration matrix from Florida. This amazing resource was picked up from Lucy Gray. Really amazing.
  • ...1 more comment...
  •  
    This technology matrix is just a great example of what Florida is looking at doing.
  •  
    This is a great guide. I would love to use something like This as a model for how we develop our PD.
  •  
    The Technology Integration Matrix (TIM) illustrates how teachers can use technology to enhance learning for K-12 students
2More

facilitatortips » Online Surveys and Forms - 0 views

  •  
    Teaching students how to use online surveys and aggregate results is an important skill as part of authentic research. This wiki page has excellent information on how to use these tools.
  •  
    Incredible wiki page about online surveys and forms. I highly recommend that we begin to have our students conduct surveys as part of authentic research. This is an excellent page about This topic. (The rest of the wiki is nice as well.)
4More

Social Networking-Why Are We Afraid? - 0 views

  • But we adults are afraid. This is not the way we grew up. We had our group of friends, our own little group. Now, the groups to which today's young people belong are hundreds and even thousands strong. Their "friends" lists go on for pages, many of them hundreds or thousands of physical miles away. This is so far from the way we communicated and learned about each other, that we cannot understand it. So we do what most people do with things they do not understand. We ignore it. If it intrudes on the way we do things, we find ways to block it.
  • Eighty-one percent of kids have visited a social networking site such as MySpace or Facebook. Yet more than 50% of schools block social networking altogether and over 80% block instant messaging and chatting services. These statistics tell us that our students are accessing these types of services regardless of our efforts to block them.
  • ith over 80 million users on MySpace alone, social networking is not going away. And that National School Boards Association report said that 50% of students using these services are specifically talking about schoolwork using these social networking tools.What? Students are talking about schoolwork? Yes. Just as we used the phone (despite our parents demands to hang up!) students today are using social networks. They are asking each other questions and discussing homework besides planning to go out. This is their way to communicate and as much as we have difficulty understanding it, it is 24/7 and schools can take some advantage of that.
  •  
    Cyberbullying, online predators, and other Internet-related dangers make headlines almost daily. Fear of what lies beyond that glowing screen at which our kids so love to stare dominates the current perception of what the Internet has become. In this climate of perceived threat, schools do what we all do with that of which we are afraid. We avoid the threat and try to forget it's out there.\n\n
1More

Affiliate company Reviews - This is trusted private affiliate company - 0 views

  •  
    When I did not fined a job, I tried to start CPA when I did not get any job. I started with mycpaaffiliate.com . I now earn $ 5000-10000 per month. I know about such a company from this site. That changed my fate. If you want to change your fate like me, give the message in support of this site. or start a CPA with a company.
1More

Blood And Organ Bank Market - Segments and Forecasts up to 2023 Research Reports: Trans... - 0 views

  •  
    The blood and organ bank market has grown healthily in past decades and is expected to continue its growth trajectory during the forecast period from 2015 to 2023. This research report analyzes This market on the basis of its market segments, major geographies, and current market trends.
« First ‹ Previous 41 - 60 of 844 Next › Last »
Showing 20 items per page