Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items matching ""digital identity"" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
1More

Three in four parents spy on children online - 0 views

  •  
    Children as young as eight are being attracted to social networking sites such as Facebook, Myspace and Bebo, with a new study revealing more than 750,000 between the ages of 8 and 12 use one, despite minimum age restrictions of 13 or 14. Parents have admitted to spying on their children online in an attempt to safeguard them from the dangers of social networking websites.
5More

Humiliation and gossip are weapons of the cyberbully - 0 views

  • ead teachers are being advised to draw up new rules on mobile phone use amid a growing number of cases of what is now known as “cyber-bullying”. In many secondary schools, over 90% of bullying cases are through text messages or internet chatrooms. It is hoped that the rules about mobile phone use will protect children from abusive texts, stop phones going off in class and prevent mobiles being taken into exam halls.
  • Although the majority of kids who are harassed online aren’t physically bothered in person, the cyber-bully still takes a heavy emotional toll on his or her victims. Kids who are targeted online are more likely to get a detention or be suspended, skip school and experience emotional distress, the medical journal reports. Teenagers who receive rude or nasty comments via text messages are six times more likely to say they feel unsafe at school.
  • The problem is that bullying is still perceived by many educators and parents as a problem that involves physical contact. Most enforcement efforts focus on bullying in school classrooms, corridors and toilets. But given that 80% of adolescents use mobile phones or computers, “social interactions have increasingly moved from personal contact at school to virtual contact in the chatroom,'’ write Kirk R. Williams and Nancy G. Guerra, co-authors of one of the journal reports. “Internet bullying has emerged as a new and growing form of social cruelty.'’
  • ...1 more annotation...
  • Cyber-bullying tactics include humiliation, destructive messages, gossip, slander and other “virtual taunts” communicated through e-mail, instant messaging, chatrooms and blogs. The problem, of course, is what to do about it. While most schools do not allow pupils to use their mobiles in the school building, an outright ban is deemed unworkable. Advances in technology are throwing up new problems for teachers to deal with. Children use their phones to listen to music, tell the time or as a calculator. Cyber-bullies sometimes disclose victims' personal data on websites or forums, or may even attempt to assume the identity of their victim for the purpose of publishing material in their name that defames them or exposes them to ridicule.
  •  
    As more and more people have access to computers and mobile phones, a new risk to youngsters has begun to emerge. Electronic aggression, in the form of threatening text messages and the spread of online rumours on social networking sites, is a growing concern.
2More

Top 8 workarounds of kid virtual-world users - 0 views

  • The Atlanta-based parenting columnist, former elementary school teacher, kids' pop culture expert, author, and mother of four spent a couple of weeks in Club Penguin to learn what her eight-year-old son might experience there. She didn't like everything she saw.
  •  
    Anne Collier [NetFamilyNews] reports on the Top 8 workarounds of kid virtual-world users - as relayed by Sharon Duke Estroff, who spent a couple of weeks on Club Penguin observing what her 8-year-old son might experience there.
1More

Safe Practices for Life Online [New ISTE book] - 0 views

  •  
    Contains dozens of classroom-tested exercises and hundreds of links to Web sites, documents, and resources, Safe Practices for Life Online offers practical advice to help middle and high school students stay safe by making better choices and minimizing their risks.
1More

Technology: Cyber Security - 0 views

  •  
    Teaching cyber security with a focus on safety and ethics has grown rapidly in importance over the past few years. Securing your personal computer and protecting classroom computers plays a crucial role in protecting our nation's Internet infrastructure.
1More

Sheriff's Deputies prowl the Web for cyber bully - 0 views

  •  
    Court order sent to YouTube in Spalla hacking incident
2More

Bullying Policy at Hudson Area School District - 0 views

  • Bullying or other aggressive behavior toward a student, whether by other students, staff, or third parties, including Board members, parents, guests, contractors, vendors, and volunteers, is strictly prohibited. This prohibition includes physical, verbal, and psychological abuse, including hazing, gestures, comments, threats, or actions to a student, which cause or threaten to cause bodily harm, reasonable fear for personal safety or personal degradation. Demonstration of appropriate behavior, treating others with civility and respect, and refusing to tolerate harassment or bullying is expected of administrators, faculty, staff, and volunteers to provide positive examples for student behavior. This policy applies to all activities in the District, including activities on school property, in a school vehicle, and those occurring off school property if the student or employee is at any school-sponsored, school-approved or school-related activity or function, such as field trips or athletic events where students are under the school’s control, or where an employee is engaged in school business. Misconduct occurring outside of school may also be disciplined if it interferes with the school environment. "Bullying" is any gesture or written, verbal, graphic, or physical act (including electronically transmitted acts – i.e. internet, telephone or cell phone, personal digital assistant (PDA), or wireless hand held device) that is reasonably perceived as being motivated either by any actual or perceived characteristic, such as race, color, religion, ancestry, national origin, gender, sexual orientation, gender identity and expression or a mental, physical, or sensory disability or impairment; or by any other distinguishing characteristic. Such behavior is considered harassment or bullying whether it takes place on or off school property, at any school-sponsored function, or in a school vehicle.
  •  
    Includes a clause for cyberbullying.
1More

Online Reputation in a Connected World [pdf] - 1 views

  •  
    This research is creating a lot of buzz because it illustrates the importance of managing our online identity and those of students. Online behavior is increasingly seen as a moral compass connected to behaviors offline. Whether it is for a job application, friendship, dating, or other purposes, when people want to learn about someone, they turn to this ever-growing pool of information. Online reputation, therefore, plays an important role in personal and professional life and has become a significant factor in making hiring decisions.
1More

Students: Keeping Personal Info Private - 1 views

  •  
    One of eight interactive case studies for kids (GR 4-8) from Cable In the Classroom: Power to Learn.
    Establishing basic guidelines for Internet use is the first step in ensuring students' online safety. Learn what information should and shouldn't be shared online and appropriate interaction with online "friends." This unit explores the concepts of privacy in social networking destinations, the importance of being honest but not revealing too much information. The graphics are Nickelodeon style. A template allows students to create class rules. For the entire series, check out: http://powertolearn.com/internet_smarts/interactive_case_studies/index.shtml
2More

Get Safe Online :: Students at greatest risk from online fraud - 0 views

  • “Our study set out to establish whether online security factors vary according to age, gender, geography and occupation. Online criminals operate on a mass scale so are indiscriminate about who they target. Whether they are successful or not depends largely on two factors: firstly, how good we are at securing our computers; and secondly, how much we avoid risky activities and behaviours while we’re using the internet.
  •  
    Internet users in full-time education (2) are almost twice as confident online as other internet users - more than half (51%) consider themselves 'very' internet literate, compared to the national average of 26%. Despite this, they are the most dismissive of the risk of online crime and of the importance of basic security tools (such as anti-virus software) in protecting them against it.
1More

The Impact of Facebook on Our Students - 0 views

  •  
    Doug Foderman and Marje Monroe of ChildrenOnline.org review concerns about Facebook and the risks for kids.\n\nThey have Facebook accounts and actually see it as a wonderful, and valuable, resource. However, just because Facebook says that anyone 14 years or old CAN use Facebook, doesn't mean that they should. It isn't an age-appropriate or developmentally healthy place for our children and younger teens to hang out. Facebook is not working to protect our children and the laws in our country are terribly inadequate to safeguard our children online, in general. Not enough is being done to protect and educate children and teens against the risks that come from using the Internet, and Facebook in particular. We (adults, parents, educators) need to do more.
1More

Abusive MySpace page draws principal's lawsuit - 0 views

  •  
    Colony High School principal Cyd Duffin doesn't do MySpace. So other people had to tell Duffin last October that a fake MySpace page appeared in her name -- a page depicting the principal as a drug-using racist with a sexually transmitted disease who insults disabled students and likes books about pornography, anarchy and the Ku Klux Klan.
1More

Jigsaw - 0 views

  •  
    Most of the world lives in countries that censor the internet. uProxy, seeded by Jigsaw and owned by the University of Washington, provides people access to the free and open internet by letting anyone who lives in a repressive society share the connection of someone who lives in a country with open internet access. uProxy works on an internet browser, with the option to set up a cloud server to provide constant access to the open internet. Perspective is an API that uses machine learning to spot abuse and harassment online.
« First ‹ Previous 81 - 93 of 93
Showing 20 items per page