Skip to main content

Home/ Groups/ Ad4dcss/Digital Citizenship
Vicki Davis

Online Activities Have Offline Consequences - 0 views

  •  
    Great post by Alfred Thompson, "the" microsoft education blogger. I think he hits the nail on the head with this one. Great post!
  •  
    Great post about how online activities should have offline consequences by Alfred Thompson.
Carla Arena

Let's Fight It Together [video] - 0 views

  •  
    I thought this video would REALLY interest you all. moving, appaling. This kid is in our classrooms. via http://thinklab.typepad.com/think_lab/2008/05/you-know-this-k.html
Vicki Davis

Michel Foucault, Privacy, and Doubts about Web 2.0 - 0 views

  •  
    Excellent post about how many are relinquishing their privacy. Very insightful post.
  •  
    Fascinating ponderings by Mike Curtain about how many of us are relinquishing our own privacy. This is a very thought provoking post and yet another one I wouldn't have read, had he not linked to my blog post yesterday asking for bloggers to share their links. This is a very powerful blog post. Wow! I personally think there is a balance here, but also agree than many are not considering the privacy they are relinquishing when they post things that don't belong out there for everyone to see. Internet privacy is an illusion, it really is.
Rafael Ribas

Is your identity worth $10 a year? - 0 views

  • This is just another great opportunity to discuss digital citizenship and internet safety in positive terms.
  •  
    I am interested in this idea about students owning their name online... what do you think?
Rafael Ribas

Student_name.com - 0 views

  •  
    Your name as an Internet domain. Follow on from previous bookmark - a graduating class were given a domain name each and instructions to set google pages on them. Really good idea!
Marie Coppolaro

KS3/4 ICT - Online Safety | Teachers TV - 0 views

  •  
    video for educators and students on the importance of online safety
Anne Bubnic

Teen Hacker Could Get 38-Year Sentence for Fixing Grades - 0 views

  • Omar Khan, 18, a student at Tesoro High School in Rancho Santa Margarita, now faces 34 felony counts of altering a public record, 11 felony counts of stealing and secreting a public record, seven felony counts of computer access and fraud, six felony counts of burglary, four felony counts of identity theft, three felony counts of altering a book of records, two felony counts of receiving stolen property, one felony count of conspiracy and one felony count of attempted altering of a public record.
  •  
    They may be just kids, but two Orange County, Calif., teens are accused of committing a whole bunch of grown-up crimes. The allegations include hacking into school computers to change grades and planting spyware on a district computer. One of them faces 69 felony charges, which could land him in prison for up to 38 years if he's convicted.
Anne Bubnic

Course: CyberSafety for Middle School - 1 views

  •  
    Lewsisville Independent School District [Flower Mound, TX] has created this excellent Cybersafety Course for Middle School Students, using moodle. It includes a week-long curriculum with videos, web sites to explore, discussion questions and quizzes.
Anne Bubnic

The Family Online Internet Safety Contract - 0 views

  •  
    Adapted by the Internet Content Rating Association (ICRA) from various other online safety pledges and contracts developed by multiple entities.
Anne Bubnic

Cybercitizenship For Kids and Parents - 0 views

  •  
    How do parents teach kids about internet morals and how to protect themselves at the same time? Hear some tips about being a good cyber-citizen Three-minute video from Gen Y Author, Vanessa Van Petten. See also: Dirt-E Secrets of an Internet Kid."

Anne Bubnic

The Newest Breed of Bully, the Cyberbully - 0 views

  • While some of what is published online may seem libelous (i.e., intended to harm the reputation of another), proving that point can be difficult and expensive. In order to prove libel, you have to prove malicious intent, something that might prove difficult if the offending Web page was put up by an adolescent. And many times, freedom of speech wins out.
  • Unless an actual crime has taken place, law enforcement officials often are unable to arrest anyone, even if they can identify the culprit. According to Lt. John Otero, commanding officer of the computer crime squad for the New York City Police Department, individuals would actually have to post a direct threat in order for the police to act. "For example, if they say, 'tomorrow I am going to hurt, kill, or injure an individual,' that would constitute a crime," he explains. A person posting such a threat could be arrested and charged with aggravated harassment. Although Otero says his department has seen some arrests, anyone under the age of 18 would not be dealt with harshly: "If the kid is too young, he would get a scolding and the incident would be brought to the parents' attention; if they are under 16, they are considered minors."
  • Like cliques, cyberbullying reaches its peak in middle school, when young adolescents are trying to figure out who their friends are and whether they fit in. "Third- and 4th-graders are just having fun with computers," says Loretta Radice, who taught computer skills to middle-schoolers in public and private schools for more than 15 years.
  • ...1 more annotation...
  • While the cyber- bully believes he cannot be caught, Radice notes that everyone leaves footsteps in cyberspace. "Everything is traceable," she says. "Kids often don't realize that."
  •  
    Because cyberbullying is such a new phenomenon, school and law enforcement officials in the United States and other countries are still sorting out the legal technicalities. "Most of what is done online is protected as free speech," says Frannie Wellings, policy fellow at the Electronic Privacy Information Center in Washington, DC.
Anne Bubnic

CyberTips for Teachers - 0 views

  •  
    The Canadian Teachers' Federation advises teachers to: Be Professional, Be Prudent, Be Prepared and Know Your Rights & Responsibilities. Get the details and precautions for your own online behavior here!
Judy Echeandia

Summer guide to cybersafety - 0 views

  • Today's child has a digital footprint the size of bigfoot (especially compared to us) and their online life is just as important to them as their "real" life.  How do we keep our children safe in this brave new world?  By educating them how to make the right decisions online and by modeling appropriate behavior on the internet.  Yes that means we need to exist in the virtual world so we can see, hear, and participate in the main street of the 21st century.
  •  
    "Today's child has a digital footprint the size of bigfoot (especially compared to us) and their online life is just as important to them as their "real" life. How do we keep our children safe in this brave new world? By educating them how to make the right decisions online and by modeling appropriate behavior on the internet. Yes that means we need to exist in the virtual world so we can see, hear, and participate in the main street of the 21st century."
Anne Bubnic

Teaching Teenagers About Harassment - 0 views

  •  
    This month, three teenage girls, students at Greensburg Salem High School in Greensburg, Pa., were charged with disseminating child pornography. They had sent nude pictures of themselves by cellphone to their teenage boyfriends, who were charged with possessing child pornography.\n\nThe legal consequences in this case may have been unique, but the behavior is not. About 20 percent of teenagers have posted or sent nude cellphone pictures of themselves, according to the National Campaign to Prevent Teen and Unplanned Pregnancy, a nonprofit group.
Judy Echeandia

Porn charges for 'sexting' stir debate - 0 views

  • As eSchool News has reported before, the growing trend of teenagers distributing nude self-portraits electronically--often called "sexting" if it's done by cell phone--has parents and school administrators worried. Some prosecutors have begun charging teens who send and receive such images with child pornography and other serious felonies. But is that the best way to handle it?
  •  
    At issue: Should teens who send racy cell-phone pictures be branded as sex offenders?
Anne Bubnic

Protecting Kids While Protecting Free Speech - 0 views

  •  
    If Wikipedia is to be believed, cyberbullying involves "the use of information and communication technologies to support deliberate, repeated and hostile behavior by an individual or group that is intended to harm others." Cyberbullying has eclipsed sexual predators on the Internet as the number one concern of policymakers, parents and kids themselves
« First ‹ Previous 1701 - 1720 of 2333 Next › Last »
Showing 20 items per page