Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items matching "Case" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
1More

School District Offers Security Lessons - 0 views

  •  
    James Logan High School, located in the San Francisco Bay Area, spans a large city block and has about 4,000 students attending its classes. Earlier in the year, some of those students made news-two for organizing a fundraiser for disaster relief in China and one for being among the winners of a national scholarship award program. That's the way schools hope their students make headlines. Unfortunately, another Logan student, 14-year-old Vernon Eddins, also made the news late last year-in that case, it was because he had become the latest victim of gang violence, which has been growing in Union City, where Logan is located.
5More

Cell Phone Safety - 0 views

  • The fact that cell phones pose a great risk when combined with driving cannot be of any surprise to anyone. Let’s face it. First, drivers must take their eyes off the road while dialing. Second, people can become so absorbed in their conversations or other cell phone use that their ability to concentrate on the act of driving is severely impaired, jeopardizing the safety of vehicle occupants and pedestrians alike.
  • Time Away from Homework. Technology affords teens (and adults) a host of ways to do something other than what they are supposed to, in this case homework.
  • Mounting Minutes ($$$) Since consumers must be 18 in order to purchase a cell phone contract in the United States, most parents are buying the phones their children carry. This is good news because parents can choose a plan that fits how the cell phone will be used and can review monthly cell phone bills which typically includes a log itemizing phone activity. However, problems still exist. For one, children can quickly go over their allotted minutes for the month which can leave their parents with bills that can easily approach hundreds of dollars for the month.
  • ...1 more annotation...
  • Cell Phones and Gaming According to Sullivan (2004)3, when cellular phone games were simple, such as the knockoffs of the Atari-era "Breakout," there wasn't much to worry about. But newer phones with color displays and higher processing power create a landscape that might make some parents worried about what their kids are playing on the bus home from school.
  •  
    Today's cellular phones (cell phones) are more than just phones, they are hightech appliances that also serve as a mini-computers. Cell phones are electronic gadgets that allow users to surf the web, conduct text chats with others, take photos, record video, download and listen to music, play games, update blogs, send instant text messages to others, keep a calendar and to-do list, and more, much more. But cell phones also carry risks and cause distractions.
4More

Peer-to-peer Networks for Exchanging Child Pornography Busted - 0 views

  • All of the defendants are charged with possession of child pornography, and some are charged with additional offenses, such as production of child pornography and committing crimes while registered as sex offenders. Those charged include a law enforcement officer, attorneys and men with previous convictions related to the child pornography.
  • These cases are the result of a coordinated investigation in which law enforcement used sophisticated software to track down computers on which child pornography was being stored and made available to others via peer-to-peer networks. Peer-to-peer networks are an increasingly popular method for sharing files on the Internet. Using software programs such as Limewire, computer users can join networks that allow the sharing of files across the Internet, often for no charge.
  • Robert Schoch, special agent in charge for the ICE office of investigations in Los Angeles, stated: “Today, those involved in child exploitation - like everyone else - are using the remarkable reach of the Internet, and peer-to-peer technology is the latest frontier. But we have a message for child sex predators who think they can escape justice by hiding in Cyberspace. We will do everything in our power and use every tool at our disposal to keep our children safe - whether they are around the block or around the world.”
  •  
    Federal and local authorities arrested seven men for possession of child pornography today as part of an ongoing multi-agency investigation spearheaded by U.S. Immigration and Customs Enforcement (ICE) and the FBI that has resulted so far in the filing of charges against 55 defendants who allegedly used peer-to-peer networks to exchange sexually graphic images of children.
3More

The Nokia Lolitas - 0 views

  • As soon as there's a new technology, it's used for sex," says Sarah Jacobs, curator of the Museum of Sex in Manhattan, which explains why people of all ages and persuasions send out naked pictures via cell phone, Craigslist and MySpace and post their sex videos on sites like YouPorn.
  • In the past six months alone, there's been a deluge of news stories about middle- and high-school students getting into trouble for sending around naked pictures and sex videos of themselves or classmates. The disposition of the cases has been wildly disparate: Some kids are arrested, some punished at school and others are lectured about online safety.
  •  
    A combustible mix of minors, sex and technology.
7More

The Road to Cybersafety - 0 views

  • Carrill is part of the Platte County Sheriff’s Office. He also leads the Western Missouri Cyber Crimes Task Force. One of his primary missions is to track down and arrest online predators who trade in child pornography.And all these cameras only make his job more challenging. About 40 percent of the nation’s minors have access to Webcams, Carrill explained, devices for uploading live video to the Internet. About 65 percent of all children have access to cell phone cameras.
  • erhaps the biggest issue is that fact that kids don’t understand that when a picture is posted online, it’s nearly impossible to remove.“Once that image is taken, it’s out there forever,” Shehan said. “The No. 1 issue that we’ve seen with Webcams is teenagers self-producing pornography.”
  • All we can tell them is, ‘I’m sorry,’” Carrill said. “The minute the camera clicks, you no longer own that image. It has the potential to harm that person years from now.”A Webcam placed in a child’s bedroom is another bad combination, according to Shehan and Carrill. Sexual predators search for kids who use Webcams in the privacy of their own rooms, then lure or blackmail the child into providing pictures of themselves.“We see cases time after time of children who take pictures, send them to a predator and get a pornographic collage back that the predator uses to blackmail the child into providing more images,” Shehan said.
  • ...3 more annotations...
  • . About 40 percent of the nation’s minors have access to Webcams, Carrill explained, devices for uploading live video to the Internet. About 65 percent of all children have access to cell phone cameras.Carrill’s team recently started a new operation to search image-trading Web sites for known child pornography in Missouri. The results were frightening, he said. More than 6,000 images were found in the state; about 700 of those pictures were downloaded in the Kansas City area.Between sexual predators who fish for images and immature decisions by kids with cameras, more children are either having their images posted online or being exposed to pornography, according to a 2006 report by the National Center for Missing and Exploited Children.
  • In the end, the best tool to defeat child pornography is parent education, according to both Shehan and Carrill. More than anything, kids need to know they can trust their parents.“It’s through that open line of communication between the parent and child that they can work through or prevent bad situations,” Carrill said.
  • All parents should follow a few basic rules when it comes to cyber safety, according to experts:- Keep computers in common areas of the home.- Monitor Internet use by children.- Enable privacy protection software.- Turn Webcams off or protect them with a password.- Track what images are being uploaded by children in the household.- Talk to children about what is appropriate.
  •  
    Webcams, cell phone cameras being put to troubling use, experts say. People are taking pictures, lots of them, and then uploading them as permanent displays in the Internet collection.
4More

How can cyberbullies be stopped? - 0 views

  • Studies show cyberbullying affects millions of adolescents and young adults. The Centers for Disease Control and Prevention last year labeled "electronic aggression" -- its term for cyberbullying -- an emerging public-health problem.
  • "It's not really the schoolyard thug character" in some cases, said Nancy Willard, executive director of the Center for Safe and Responsible Internet Use, a research and professional development organization in Eugene, Ore. "It's the in-crowd kids bullying those who don't rank high enough."What fuels cyberbullying is "status in schools -- popularity, hierarchies, who's cool, who's not," said Danah Boyd, a fellow at the Berkman Center for Internet and Society at Harvard Law School who studies teens' behavior on MySpace, Facebook and other social-networking sites.
  • Cyberbullying has impelled lawmakers, especially at the state level, to either pass anti-bullying laws that encompass cyberbullying or add cyberbullying to existing statutes. Some laws are propelled by a mix of concern about electronic bullying and online sexual predators.
  •  
    Social networking Web sites and other technologies enable schoolyard bullies to pack a bigger punch. Advice and concerns from Nancy Willard and other experts in the field.
1More

Woman Accused in MySpace Suicide Case Seeks to Have Charges Dismissed - 0 views

  •  
    "The lawyer for a Missouri mother accused of creating a fake MySpace page to harass a 13-year-old girl is arguing that charges should be tossed out of court because if she is guilty, then so are millions of Internet users every day."
9More

Eight Ways to Handle Cyberbullies - 0 views

  • 1. Identify and blockFirst, ask your child not to respond or retaliate, no matter how tempting it may be to fight back. If you can identify who's cyberbullying your child, block any further communications.
  • 2. Set boundariesYou, not your kids, should also contact the bully (or bullies) and demand the offending behavior stop
  • 3. File a complaint Most cyberbullying behavior -- harassment, threats, invasion of privacy, stalking -- are violations of a web site or Internet service provider's "terms of service."
  • ...5 more annotations...
  • 4. Contact the schoolIf you know the bully attends the same school as your child, teachers and administrators might be able to help.
  • 5. Send a certified letterIf you've done all you can and the bullying hasn't stopped, send the child's parents a certified "cease and desist" letter.
  • 6. Call an attorneyIn the worst case scenario, a lawyer can help you consider filing a civil suit against bullies and/or their parents for defamation, harassment or other causes.
  • 7. Contact the local policeIf there's any evidence that the cyberbully's tactics include criminal actions, such as hate crimes, physical threats or talk of brandishing weapons at school, contact your local police immediately.
  • . Talk with your kids about what's acceptableAnne Collier, editor of NetFamilyNews web site, an email newsletter about online safety for kids, says to truly stop cyberbullying, however, you have to first know what's happening when your kids are online.
  •  
    Nancy Willard and Anne Collier offer eight ways to deal with cyberbullies in this article.
    1. Identify and block.
    2. Set boundaries.
    3. File a complaint.
    4. Contact the school
    5. Send the parents a certfied "cease and desist" letter.
    6. Call an attorney.
    7. Contact the local police.
    8. Talk with your kids about what's acceptable.

3More

Our Kids Are Failing - And It's All Wikipedia's Fault! - 0 views

  • n. Yesterday, news broke out in Scotland about how the internet was to blame for Scotland's failing exam pass rates. According to the Scottish Parent Teacher Council (SPTC), Wikipedia, among other sources, was cited as the reason as to why the students were failing. Is this a case of the internet making us stupid? Or do students just need to learn how to use the new research tools of the web a little more appropriately?
  • Children are very IT-savvy, but they are rubbish at researching." She noted that today's students do the majority of their research online instead of using books or other resources that could be found at the library.
  •  
    Children may be net savvy but their critical reading and research skills are not finely honed. They don't understand that they shouldn't believe everything they read. To kids, WIKIPEDIA is still the gospel.
2More

wikisinEFL » Wikis in EFL - 0 views

  •  
    A website with examples of best practices of wikis used in EFL (english as a foreign language) classes. Excellent. \n\nKudos to this!
  •  
    A website with examples of best practices of wikis used in EFL (english as a foreign language) classes. Excellent.
3More

Technology in the Middle » Blog Archive » 1:1-Digital Citizenship - 1 views

  •  
    Patrick Woessner's post on Digital Citizenship\nLast week I began unfolding the four "themes" that will guide our 1:1 Tablet PC implementation:\n\n * Information Management and Research\n * Digital Citizenship\n * Communication and Collaboration in a Global World\n * Creativity, Critical Thinking, and Design\n
  •  
    Excellent post discussing the elements of digital citizenship.
  •  
    Excellent blog post about the elements of digital citizenship from an educator. This makes a case about what should be done and how.
2More

Access Denied: The Practice and Policy of Global Internet Filtering - 0 views

  • ccess Denied examines the political, legal, social, and cultural contexts of Internet filtering in these states from a variety of perspectives. Chapters discuss the mechanisms and politics of Internet filtering, the strengths and limitations of the technology that powers it, the relevance of international law, ethical considerations for corporations that supply states with the tools for blocking and filtering, and the implications of Internet filtering for activist communities that increasingly rely on Internet technologies for communicating their missions.
  •  
    New book on the state of internet filtering worldwide
7More

Ideas and Thoughts from an EdTech [Blog Archive] - 0 views

  • Her reaction was to block all these sites, ban her daughter from the home computer and demand the school district to install content filtering that would prohibit any access to social networks.
    • Rafael Ribas
       
      Exactly the kind of reaction an uneducated parent would have - away from my child!
  • social networking should be taught in the homes
  • Teachers are our best filters at school
    • Rafael Ribas
       
      Hear hear! That is exactly what we need to say loud and clear
  •  
    Very interesting post by Dan Shareski on the connections between parents, school districts, students and the internet.
  •  
    podcast outlining a parent's fears about non filtering of Facebook at school
2More

YouTube - Please ban cell phone use while driving. - 0 views

  •  
    Discussing proper interaction and safety with digital devices is important.
  •  
    Responsible use of electronic devices is going to become increasingly important because today cell phone is a distraction --- tomorrow it will be in car movies or gps devices. It is the behavior that is the problem and proper focus on real life has to be something we emphasize as we discuss the proper relationship of humans with "gadgets."
2More

Review of Frontline: Growing Up Online - 0 views

  •  
    I'm surprised by this review of the Frontline program. I would have thought Eric would have been more critical. I agree that it's an important show to watch; however, I was concerned with a few things. One, I was concerned with the portrayal of a "helicopter" mom who wanted her kids' social networking passwords in case of emergency and I was also concerned about the kid who very cavelierly said he never read books. I also really wondered about parents who complained that their kids never turned off their cellphones at dinner time. I need to re-watch this program, but I think there is much here to be discussed that's not about the technology. It's about how we talk to and engage our students and children. It's really easy to blame bad behavior and scary incidents on technology.
  •  
    [February 08] A summary of each chapter and commentary provided by Eric Grant.
5More

Fact or Folly - For Teachers | Introduction - 0 views

  • But the Internet is different. In most cases it has no such gatekeepers: anyone and everyone can appear to be an "expert." So to get the most out of the Internet, students need to learn two things: first, how to find good information online; and second, how to evaluate the information they find.
  • Using the template The Five Ws of Cyberspace as a guide, young people can examine the authorship, purpose, perspective and presentation of Web sites, in order to determine their credibility.
  • Deconstructing Web Pages provides a step-by-step application of the five Ws to an actual Web site - with some interesting results.
  • ...1 more annotation...
  • And finally, Quick Tips for Authenticating Online Information offers some simple and effective strategies for assessing sites.
  •  
    Anybody can post information on the Internet, making it possible to find "proof" of any ideas or beliefs you can imagine. Yet to many students, "If it's on the Internet, it must be true."
26More

Online Predators and Their Victims - 0 views

  • My (Liz B. Davis ) Summary of Key Points (All are quotes directly from the article): Online "Predators" and Their Victims. Myths, Realities, and Implications for Prevention and Treatment. by: Janis Wolak, David Finkelhor, and Kimberly J. Mitchell - University of New Hampshire and Michele L. Ybarra - Internet Solutions for Kids, Inc.
  • The publicity about online"predators" who prey on naive children using trickery and violence is largely inaccurate.
  • adult offenders who meet, develop relationships with, and openly seduce underage teenagers
  • ...21 more annotations...
  • In the great majority of cases, victims are aware they are conversing online with adults. In the N-JOV Study, only 5% of offenders pretended to be teens when they met potential victims online. (112)
  • Offenders rarely deceive victims about their sexual interests.
  • promises of love and romance
  • 99% of victims of Internet-initiated sex crimes in the N-JOV Study were 13 to 17 years old, and none were younger than 12. 48% were 13 or 14 years old. (115)
  • it was those 15-17 years of age who were most prone to take risks involving privacy and contact with unknown people. (115)
  • take place in isolation and secrecy, outside of oversight by peers, family  members, and others in the youth's face-to-face social networks (115)
  • Most of the online child molesters described in the N-JOV Study met their victims in chatrooms. In a 2006 study, about one third of youths who received online sexual solicitation had received them in chatrooms. (116)
  • Youth internet users with histories of offline sexual or physical abuse appear to be considerably more likely to receive online aggressive sexual solicitations. (117)
  • ..Although Internet safety advocates worry that posting personal information exposes youths to online molesters, we have not found empirical evidence that supports this concern. It is interactive behaviors, such as conversing online with unknown people about sex, that more clearly create risk. (117)
  • Online molesters do not appear to be stalking unsuspecting victims but rather continuing to seek youths who are susceptible to seduction. (117)
  • maintaining online blogs or journals, which are similar to social networking sites in that they often include considerable amounts of personal information and pictures, is not related to receiving aggressive sexual solicitation unless youths also interact online with unknown people. (117)
  • Boys constitute 25% of victims in Internet-initiated sex crimes, and virtually all of their offenders are male. (118
  • Some gay boys turn to the internet to find answers to questions about sexuality or meet potential romantic partners, and there they may encounter adults who exploit them. (118)
  • ..child molesters are, in reality, a diverse group that cannot be accurately characterized with one-dimensional labels. (118)
  • Online child molesters are generally not pedophiles. (118)Online child molesters are rarely violent. (119)
  • Child pornography production is also an aspect of Internet-initiated sex crimes. One in five online child molesters in the N-JOV Study took sexually suggestive or explicit photographs of victims or convinced victims to take such photographs of themselves or friends. (120)
  • Youths may be more willing to talk extensively and about more intimate matters with adults online than in face-to-face environments. (121
  • it may not be clear to many adolescents and adults that relationships between adults and underage adolescents are criminal. (122)
  • Simply urging parents and guardians to control, watch, or educate their children may not be effective in many situations. The adolescents who tend to be the victims of Internet-initiated sex crimes many not themselves be very receptive to the advice and supervision of parents. (122)
  • We recommend educating youths frankly about the dynamics of Internet-initiated and other nonforcible sex crimes. Youths need candid, direct discussions about seduction and how some adults deliberately evoke and then exploit the compelling feelings that sexual arousal can induce. (122)
    • anonymous
       
      Let's remember that although there are direct references to gay and male pedophiles of gay boys, that 99% of child sex offenders identify as heterosexual, online or offline.
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
  •  
    This research article has the facts about sexual predatory behavior.
3More

Iditarod-Collaborative-Project » home - 0 views

  • Iditarod Collaborative Project.
  •  
    elementary classrooms connecting from USA, Canada, and Lebanon via a wiki project.
  •  
    Elementary classrooms connecting about the Iditarod. From USA, Canada, and Lebanon. They will be re-running this project again next year.
« First ‹ Previous 101 - 120 of 149 Next › Last »
Showing 20 items per page