Skip to main content

Home/ Groups/ Ad4dcss/Digital Citizenship
1More

Welcome to the world of "We Think" - 1 views

  •  
    4-minute video: "Welcome to the World of We Think. Based on a new book by Charles Leadbeater, 'We Think' explores the potential of the latest developments of the internet.
1More

Five Steps to Combat Bullying with Comic Life - 9 views

  •  
    Tackling cyberbullying using COMIC LIFE
1More

Think B4 U post [Video] - 9 views

  •  
    A 20-second PSA produced for Safer Internet Day (Feb 2010), as celebrated through 500 events in 50 countries all over the world.
1More

Cybersafety Games - 9 views

  •  
    Looking for games online that might help students learn important cybersafety concepts? Add this collection from around the world to your digital citizenship training efforts.
1More

Eight Tips for Monitoring and Protecting Your Online Reputation - 9 views

  •  
    Here are 8 tips to monitor and protect one's online reputation from the U.S. Government Information Security Blog: Search your name. Type your first and last name within quotation marks into several popular search engines to see where you are mentioned and in what context. Narrow your search and use keywords that apply only to you, such as your city, employer and industry association. Expand your search. Use similar techniques to search for your telephone numbers, home address, e-mail addresses, and personal website domain names. You should also search for your social security and credit card numbers to make sure they don't appear anywhere online. Read blogs. If any of your friends or coworkers have blogs or personal web pages on social networking sites, check them out to see if they are writing about or posting pictures of you. Sign up for alerts. Use the Google alert feature that automatically notifies you of any new mention of your name or other personal information. Limit your personal information. Tweet/chat/discuss regarding business and the emerging trends in your industry, but limit posting information on your personal life, which could be a subject of major scrutiny by recruiters and hiring managers. Also, be sure you know how organizations will use your information before you give it to them. Use privacy settings. Most social networking and photo-sharing sites allow you to determine who can access and respond to your content. If you're using a site that doesn't offer privacy settings, find another site. Choose your photos and language thoughtfully. You need to ensure that information posted online is written professionally without use of swear words and catchy phrases. Also, be very selective in posting photographs, and use your judgment to ensure that these photographs are how you want the world to see you. Take action If you find information about yourself online that is embarrassing or untrue, cont
1More

Tutorial: How to Choose a Search Tool - 9 views

  •  
    How to search for anything online
1More

Interdisciplinary Response to Youth Sexting - 9 views

  •  
    from NetSmartz, this 5 pg doc provides focus questions and recommended steps to prevent and respond to sexting
1More

Kidsmart: Teachers Section - 9 views

  •  
    Internet Safety Lesson plans are available on this site at http://kidsmart.org.uk/teachers/lessonplans.aspx
1More

www.bullying.org - 9 views

  •  
    The companion site to this resource is http://www.cyberbullying.org/
1More

It's My Life : Online Bullying [PBS Kids] - 9 views

  •  
    PBS Kids tackles the topic of bullying, including how to handle it, innocent by-standers and online bullying. It's My Life is funded by the Corporation for Public Broadcasting to create safe, engaging, and educational online media for kids aged 9 to 12. Content is available in English and Spanish.
1More

WSJ|Five Misunderstandings About Bullying - 9 views

  •  
    Note dana boyd's position that "Most anti-bullying assemblies are ineffective, and the messages of well-meaning advocates tend to fall on deaf ears". Students need to learn empathy, sensitivity and respect, all of which are life skills.
2More

Photo Tampering Throughout History - 0 views

  •  
    Dartmouth collection of photo tampering through history.
  •  
    A good collection of digital photo manipulation in mass media imagery. Compiled by Dr. Hany Farid from Dartmouth. \n
10More

Technology Integration Matrix - 0 views

  • The Technology Integration Matrix (TIM) illustrates how teachers can use technology to enhance learning for K-12 students. The TIM incorporates five interdependent characteristics of meaningful learning environments: active, constructive, goal directed (i.e., reflective), authentic, and collaborative (Jonassen, Howland, Moore, & Marra, 2003). The TIM associates five levels of technology integration (i.e., entry, adoption, adaptation, infusion, and transformation) with each of the five characteristics of meaningful learning environments. Together, the five levels of technology integration and the five characteristics of meaningful learning environments create a matrix of 25 cells as illustrated below.
  • Levels of Technology Integration into the Curriculum
  • Basic technology skills and integration of technology into the curriculum go hand-in-hand to form teacher technology literacy.
    • Chris Hoelzer
       
      To often we ask teachers to impliment technology tools without the proper explanation or PD.
  • ...2 more annotations...
  • professional development planning and needs assessment resource
  • evaluate teachers’ current levels of proficiency with technology
  •  
    Technology integration matrix from Florida. This amazing resource was picked up from Lucy Gray. Really amazing.
  • ...1 more comment...
  •  
    This technology matrix is just a great example of what Florida is looking at doing.
  •  
    This is a great guide. I would love to use something like this as a model for how we develop our PD.
  •  
    The Technology Integration Matrix (TIM) illustrates how teachers can use technology to enhance learning for K-12 students
26More

Online Predators and Their Victims - 0 views

  • My (Liz B. Davis ) Summary of Key Points (All are quotes directly from the article): Online "Predators" and Their Victims. Myths, Realities, and Implications for Prevention and Treatment. by: Janis Wolak, David Finkelhor, and Kimberly J. Mitchell - University of New Hampshire and Michele L. Ybarra - Internet Solutions for Kids, Inc.
  • The publicity about online"predators" who prey on naive children using trickery and violence is largely inaccurate.
  • adult offenders who meet, develop relationships with, and openly seduce underage teenagers
  • ...21 more annotations...
  • In the great majority of cases, victims are aware they are conversing online with adults. In the N-JOV Study, only 5% of offenders pretended to be teens when they met potential victims online. (112)
  • Offenders rarely deceive victims about their sexual interests.
  • promises of love and romance
  • 99% of victims of Internet-initiated sex crimes in the N-JOV Study were 13 to 17 years old, and none were younger than 12. 48% were 13 or 14 years old. (115)
  • it was those 15-17 years of age who were most prone to take risks involving privacy and contact with unknown people. (115)
  • take place in isolation and secrecy, outside of oversight by peers, family  members, and others in the youth's face-to-face social networks (115)
  • Most of the online child molesters described in the N-JOV Study met their victims in chatrooms. In a 2006 study, about one third of youths who received online sexual solicitation had received them in chatrooms. (116)
  • Youth internet users with histories of offline sexual or physical abuse appear to be considerably more likely to receive online aggressive sexual solicitations. (117)
  • ..Although Internet safety advocates worry that posting personal information exposes youths to online molesters, we have not found empirical evidence that supports this concern. It is interactive behaviors, such as conversing online with unknown people about sex, that more clearly create risk. (117)
  • Online molesters do not appear to be stalking unsuspecting victims but rather continuing to seek youths who are susceptible to seduction. (117)
  • maintaining online blogs or journals, which are similar to social networking sites in that they often include considerable amounts of personal information and pictures, is not related to receiving aggressive sexual solicitation unless youths also interact online with unknown people. (117)
  • Boys constitute 25% of victims in Internet-initiated sex crimes, and virtually all of their offenders are male. (118
  • Some gay boys turn to the internet to find answers to questions about sexuality or meet potential romantic partners, and there they may encounter adults who exploit them. (118)
  • ..child molesters are, in reality, a diverse group that cannot be accurately characterized with one-dimensional labels. (118)
  • Online child molesters are generally not pedophiles. (118)Online child molesters are rarely violent. (119)
  • Child pornography production is also an aspect of Internet-initiated sex crimes. One in five online child molesters in the N-JOV Study took sexually suggestive or explicit photographs of victims or convinced victims to take such photographs of themselves or friends. (120)
  • Youths may be more willing to talk extensively and about more intimate matters with adults online than in face-to-face environments. (121
  • it may not be clear to many adolescents and adults that relationships between adults and underage adolescents are criminal. (122)
  • Simply urging parents and guardians to control, watch, or educate their children may not be effective in many situations. The adolescents who tend to be the victims of Internet-initiated sex crimes many not themselves be very receptive to the advice and supervision of parents. (122)
  • We recommend educating youths frankly about the dynamics of Internet-initiated and other nonforcible sex crimes. Youths need candid, direct discussions about seduction and how some adults deliberately evoke and then exploit the compelling feelings that sexual arousal can induce. (122)
    • anonymous
       
      Let's remember that although there are direct references to gay and male pedophiles of gay boys, that 99% of child sex offenders identify as heterosexual, online or offline.
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
  •  
    This research article has the facts about sexual predatory behavior.
1More

FRONTLINE: Growing Up Online - Teacher's Guide - 0 views

  •  
    FRONTLINE had developed materials for teachers, parents and kids to accompany Growing Up Online. These resources include downloadable viewing guides for parent and for teachers that includes a seven-part discussion question section, lesson plans for the classroom, resources for building parent-teen online engagement, and a Cyberquiz: "What Kind of Cyber Guide are You?" that explores parents' media management styles.
1More

What Are We Protecting Them From? - 0 views

  •  
    By mandating schools restrict internet access, CIPA and other federal and state legislation intend to guard students' safety online-but all they may be doing is keeping vital educational technology out of the classroom. No one disputes the need to protect kids from the harm that lurks online. What's at issue is whether or not mandated internet filters are the best way to achieve those safeguards-or whether the filters aren't up to the task and are actually interfering with the educational mission by obstructing use of important Web 2.0 tools.
1More

Parent Permission Sample for Read/Write Activities on the Web - 0 views

  •  
    This form is powered by Wufoo Online forms and is a 'guide' to getting parent permission at the teacher level to allow students to participate in read/write activities. It is not a 'policy'. You will need to produce a printed version to ensure that you have a signature. Ensure that you provide adequate opportunity for parents to contact you with questions or express an interest in parental education about the read/write web.
2More

Twitter refuses to uphold Terms of Service - 0 views

  •  
    Cyberbullying on twitter.
  •  
    Cyberbullying can happen anywhere, even twitter. Warning: this post is rated R for use of 1-2 words of profanity.
« First ‹ Previous 221 - 240 Next › Last »
Showing 20 items per page