Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items matching "account" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
2More

Free speech vs. class disruption - 0 views

  •  
    A court case from May 2007. It was a sophomoric online video criticizing the hygiene of a teacher. Is suspension a violation of the U.S. Constitution's First Amendment guarantee of freedom of speech?

    UPDATE: In a federal court session on May 23, 2007, U.S. District Judge Marsha Pechman turned down the request of Gregory Requa, 18, to grant a temporary restraining order ending the 40-day suspension. "The court has no difficulty in concluding that one student filming another student standing behind a teacher making 'rabbit ears' and pelvic thrusts in her direction, or a student filming the buttocks of a teacher as she bends over in the classroom, constitutes a material and substantial disruption to the work and discipline of the school. "The 'work and discipline of the school' includes the maintenance of a civil and respectful atmosphere toward teachers and students alike -- demeaning, derogatory, sexually suggestive behavior toward an unsuspecting teacher in a classroom poses a disruption of that mission whenever it occurs.
  •  
    Bullying by students - filming teacher in the classroom - targeting a teacher and posting on YouTube ensuing court case about the accountability of the Kent School Board for making a decision on punishing a student using unsigned, unsworn statements from anonymous students
10More

Teaching Teenagers About Harassment - 0 views

  • About 20 percent of teenagers have posted or sent nude cellphone pictures of themselves, according to the National Campaign to Prevent Teen and Unplanned Pregnancy, a nonprofit group.
  • digital dating violence.
  • The behaviors can be a warning sign that a teenager may become a perpetrator or a victim of domestic violence, according to the group.
  • ...6 more annotations...
  • teenagers frequently received digital threats or upsetting requests from people they were dating. But the teenagers were not talking about it, did not know how to handle it and did not know what was appropriate and what was not.
  • “It was abuse that there was no protocol around,” Mr. Law said. The parents were not aware of the interactions, and the teenagers did not know how to prevent it, he said.
  • The campaign and its Web site, ThatsNotCool.com, encourage teenagers to set their own boundaries. It is intended to appeal to all teenagers, not just those with serious problems. “The kids don’t want to be told what’s right and what’s wrong,” Mr. Law said. On the site, teenagers can send one of 35 “callout cards” — brightly colored messages they can send by e-mail, post to their Facebook or MySpace accounts or download — that are meant to tell someone they have crossed a line. The messages are sharp. For example: “Congrats! With that last text, you’ve achieved stalker status.”
  • The site offers an area where teenagers can seek advice, like how to stop a boyfriend from nonstop text-messaging. For more direct advice, the site tells teenagers to call or conduct a live chat with trained volunteers.
  • The campaign is digitally focused, reflecting the way teenagers communicate. Even the posters that will appear in schools, which display some of the “callout card” messages, ask viewers to snap a photo with their cellphone and text-message it to someone.
  • All of the communications are aimed at teenagers, not parents. Ms. Soler said the fund was working on a campaign to alert parents to problems, but for now, she wanted to get teenagers discussing them.“We want to give them the tools to say ‘You can have a healthy relationship, and here’s the road map,’ ” Ms. Soler said.
  •  
    A New Ad Warns About Abusive Texting\nA new public service ad highlights the growing problems of "textual abuse," where harassment of children occurs by way of text messages.
3More

More than one face to Cyberbullying in the classroom - 0 views

  • 4. Disrespect- If you are going to treat me, or others in a way that is hurtful, if you are going to 'injure' others emotionally/socially... then we have a problem. Hitting someone, or physically hurting someone puts you in the 'Dangerous' category and becomes an immediate office referral. Disrespect on the other hand is a little different. If you emotionally or socially injure someone then you are defying one or two of our school beliefs : Respect and/or Inclusion.
  • This act, whether done simply as a joke, or with hurtful intentions, was wrong on many levels, from identity theft with the use of Student 1's account to social embarrassment of Student 3, (and Student 1 as well). It is cyberbullying because it used technology as the medium to bully. 
  •  
    Teachable moments. How one teacher dealt with cyberbullying in his classroom.
2More

Policies Target Teacher-Student Cyber Talk - 1 views

  • The motivation for the bill was growing problems with [interactions] that started relatively innocently and escalated from there,” sa
  •  
    A new state lawRequires Adobe Acrobat Reader requires all Louisiana districts to implement policies requiring documentation of every electronic interaction between teachers and students through a nonschool-issued device, such as a personal cellphone or e-mail account, by Nov.15. Parents also have the option of forbidding any communication between teachers and their child through personal electronic devices.
1More

Man Arrested for Hacking Into Obama's Twitter - 0 views

  •  
    A Frenchman will face trial after hacking into Twitter accounts, including that of U.S President Barack Obama, a French prosecutor said.
1More

Teacher's Guide to Using Facebook - 0 views

  •  
    A guide for teachers who want to create a Facebook Account for their personal or professional lives.
12More

Cyber Bullying - School Policies? - 0 views

  • A punch in the eye seems so passé. Bullies these days are traveling in packs and using cyberspace to their humiliating messages online. Like the toughies of old, they are both boys and girls and they demand nothing less than total submission as the price of peace. It’s a jungle out there. For school districts, patrolling the hallways and adjacent grounds is just a start. In the 21st century, a new kind of vigilance is necessary—an expanded jurisdiction that serves to both stave off legal actions and ensure a safe and productive learning environment.
  • Today’s principals rely on district policy and practice to extend the presumed long arm of the law to off-campus incidents. Potentially, that could mean plunging headlong into the electronic frontier to rescue student victims and thwart cyberbullying classmates who thrive as faceless computer culprits.
  • A December 2009 study by Harvard University’s Berkman Center for Internet & Society found that students on the receiving end report greater emotional distress, are more likely to abuse substances, and are more frequently depressed.
  • ...8 more annotations...
  • The report concluded a child is more likely to face cyberbullying by fellow students than being stalked by an online predator. “Bullying and harassment are the most frequent threats minors face, both online and offline,” notes the Harvard report, Enhancing Child Safety & Online Technologies: Final Report of the Internet Safety Task Force to the Multistate Working Group on Social Networking of State Attorneys General of the United States.
  • Bullying can take a variety of forms. Incidents have included stealing passwords, impersonating the victim online, fake MySpace or Facebook pages, embarrassing photos or information being revealed, threats, rumors, and more. And, bullying tends to magnify the longer it exists.
  • Students sometimes will cyberbully teachers or other school employees
  • In January, a federal court in Connecticut ruled that Regional District 10 was within its rights to discipline a student over an off-campus blog. Judge Mark Kravitz rejected Avery Doninger’s claim that the school violated her free speech rights when they refused to let her serve as class secretary or to speak at graduation because of words she wrote at home
  • According to the Hartford Courant, the school district won “because the discipline involved participation in a voluntary extracurricular activity, because schools could punish vulgar, off-campus speech if it posed a reasonably foreseeable risk of coming onto school property, and because Doninger’s live journal post was vulgar, misleading, and created the risk of substantial disruption at school.”
  • In Florida, a high school senior and honor student was accused of cyberbullying after she wrote on Facebook: ‘’Ms. Sarah Phelps is the worst teacher I’ve ever met! To those select students who have had the displeasure of having Ms. Sarah Phelps, or simply knowing her and her insane antics: Here is the place to express your feelings of hatred.’’ Katherine Evans, who was suspended for “bullying and cyberbullying harassment toward a staff member,” sued the charter school in December 2008. A final ruling is pending.
  • In a 2007 incident, 19 students were suspended at a Catholic high school near Toronto for cyberbullying a principal on Facebook. The students called the principal a “Grinch of School Spirit” and made vulgar and derogatory comments. While the U.S. Constitution does not necessarily apply in private school settings, the incident demonstrates that this kind of behavior can happen anywhere.
  • Districts should have a cyberbullying policy that takes into account the school’s values as well as the school’s ability to legally link off-campus actions with what is happening or could happen at school.
  •  
    Good article from AMERICAN SCHOOL on the policies that schools need to have in place to protect both students and teachers from cyberbullies.
2More

Facebook case helps fight cybercrime - 0 views

  • School resource officers from across Alabama and the nation fielded complaints about an Internet extortionist badgering girls for nude pic­tures. Victims even created a Facebook page warning fe­males not to talk to the per­son with the username Meta­scape. Metascape turned out to be Jonathan Vance, an Alabama man who made lewd cyber re­quests of 206 girls and young women and attempted to hack into and gain control of their e-mail, Facebook and MySpace accounts, federal authorities say. He was suc­cessful in at least 53 cases.
  •  
    School resource officers from across Alabama and the nation fielded complaints about an Internet extortionist badgering girls for nude pictures. Victims even created a Facebook page warning females not to talk to the person with the user name Metascape.
1More

Stolen Picture : Extraordinary Mommy - 0 views

  •  
    This is an amazing first-person account of a family photo that had been posted on a personal blog and somehow ended up being used in a storefront ad in Prague! A friend who lived there happened to spot it one day and sent the woman the storefront photos. The primary source of the photo had been this woman's family blog. Copyright violation? The photo had clearly been used for commercial purposes without permission. But what can she do when it involves a country so far away? Check out the blog comments for a lively conversation on the topic, as everyone weighs in.
1More

Bibsonomy account! - 0 views

  •  
    Please follow me and will follow you back. The Gojobio site will help you find your desired work and company. Gob Bless!!

Get Immediate Cash Loans No Credit Check Even Without Any Collateral! - 0 views

started by Rof Harris on 24 Feb 16 no follow-up yet

Get Immediate Cash Loans No Credit Check Even Without Any Collateral! - 0 views

started by Rof Harris on 24 Feb 16 no follow-up yet

Get Immediate Cash Loans No Credit Check Even Without Any Collateral! - 0 views

started by Rof Harris on 11 Mar 16 no follow-up yet

Get Immediate Cash Loans No Credit Check Even Without Any Collateral! - 0 views

started by Rof Harris on 11 Mar 16 no follow-up yet

Bad Credit Loans- Loans For Borrowers With Low Reliability - 0 views

started by James Abegglen on 12 Jan 16 no follow-up yet

Cash Today With 100% Online Application From Bad Credit Loans - 0 views

started by Peterss Jone on 14 Oct 16 no follow-up yet
1More

The Ultimate Guide to Instagram Shopping Trends - 1 views

  •  
    You want to make sure you're using Instagram shopping Trends as effectively as possible - we're talking beautiful imagery, great captions, and sales pitches timed to perfection. In the following guide, we'll take you through the steps to get set up with shopping on Instagram and reveal a few handy tips and tricks to seamlessly integrate your shopping posts into your feed. - Instagram Shopping Posts Give Your Followers an Easier Way to Shop - Instagram Shopping Posts Tap into an Already Engaged Audience - How To Set Up Instagram Shopping For Your Account - How to Add Product Tags to Your Instagram Posts - How to Add Shopping Stickers to Instagram Stories Posts - How to Set up A Shoppable Feed with Linkin.Bio by Later Just start by taking the first steps to be an approved retailer with Instagram, and then you can begin creating awesome posts with tagged products for easier Instagram shopping for your followers!
1More

McAfee.com/Activate - Enter your Activation Code: Is Mcafee Any Good? - 0 views

  •  
    Mcafee 25 digit activation code will guide you with each and every steps for McAfee like from signing up to the mcafee activate enter code account to the steps to download and install McAfee from www.mcafee.com/activate and then mcafee 25 digit activation code will guide you how to find McAfee activation code and steps to mcafee.com activate as well because McAfee activate is the most important factor otherwise your antivirus will not work.
1More

McAfee.com/Activate - Enter your Activation Code: why we use McAfee Activate Product Fe... - 0 views

  •  
    Mcafee 25 digit activation code will guide you with each and every steps for McAfee like from signing up to the mcafee activate enter code account to the steps to download and install McAfee from www.mcafee.com/activate and then mcafee 25 digit activation code will guide you how to find McAfee activation code and steps to mcafee.com activate as well because McAfee activate is the most important factor otherwise your antivirus will not work.
1More

Five Essential Questions when Choosing the Right CPA for an Adjuster - 0 views

  •  
    As a small business owner, an independent adjuster must wear many hats. They are a salesman, negotiator, and analyst (and sometimes grief counselor!) all rolled into one. No matter how well an adjuster performs these roles, the long-term success of his business will greatly depend upon effective financial management. A Certified Public Accountant (CPA) can help ensure that happens.
« First ‹ Previous 121 - 140 of 143 Next ›
Showing 20 items per page