Skip to main content

Home/ Groups/ Ad4dcss/Digital Citizenship
Anne Bubnic

Digital Directions: 'First Line of Defense' - 0 views

  •  
    There's been a definite uptick in the number of school districts that have adopted Internet-safety curricula, says Godlis, and because of a recent update to the federal Children's Internet Protection Act, which requires schools receiving money through the federal E-rate program to provide Internet-safety education to students, that number will surely rise.
JOSEPH SAVIRIMUTHU

New Media Literacies Community Site - 0 views

  • Our first Teachers' Strategy Guide: Reading in a Participatory Culture, offers strategies for integrating the tools, approaches, and methods of Comparative Media Studies into the English and Language Arts classroom. The guide provides a set of lesson plans using Herman Melville's Moby-Dick as the sample text and a theater adaptation by Ricardo Pitts-Wiley entitled Moby-Dick: Then and Now as an example of a contemporary adaptation. The guide is intended to demonstrate techniques which could be applied to the study of authorship in relation to a range of other literary works, pushing us to reflect more deeply on how authors build upon the materials of their culture and in turn inspire others who follow to see the world in new ways.
  •  
    Materials from Learning Library, Teachers' Strategy Guides & Ethics Casebook
Anne Bubnic

How to be a Common Sense School [video] - 0 views

  •  
    Learn how to implement the Common Sense Schools program in your school.
JOSEPH SAVIRIMUTHU

Fostering Learning in the Networked World - 1 views

  • Imagine a high school student in the year 2015. She has grown up in a world where learning is as accessible through technologies at home as it is in the classroom, and digital content is as real to her as paper, lab equipment, or textbooks. At school, she and her classmates engage in creative problem-solving activities by manipulating simulations in a virtual laboratory or by downloading and analyzing visualizations of real-time data from remote sensors. Away from the classroom, she has seamless access to school materials and homework assignments using inexpensive mobile technologies. She continues to collaborate with her classmates in virtual environments that allow not only social interaction with each other but also rich connections with a wealth of supplementary content. Her teacher can track her progress over the course of a lesson plan and compare her performance and aptitudes across a lifelong “digital portfolio,” making note of areas that need additional attention through personalized assignments and alerting parents to specific concerns. What makes this possible is cyberlearning, the use of networked computing and communications technologies to support learning. Cyberlearning has the potential to transform education throughout a lifetime, enabling customized interaction with diverse learning materials on any topic—from anthropology to biochemistry to civil engineering to zoology. Learning does not stop with K–12 or higher education; cyberlearning supports continuous education at any age.
  •  
    The more one delves into the Net Generation - Cyber Safety Debate, the more one is inclined to think that one of the most difficult challenges facing educators and parents is to embrace the "cultural" shift.
  •  
    (EDUCAUSE Review
Anne Bubnic

Load Your Camera Phone Pix onto the Web - 0 views

  •  
    Ever wonder how your students do it? Steve Dotto shows you how you can take a picture with a camera phone and upload it to the web in only a few seconds. He discusses the privacy concerns around our pictures and sharing them.
Anne Bubnic

Do Social Networks Bring the End of Privacy? [Scientific American] - 0 views

  • The closest U.S. privacy law comes to a legal doctrine akin to copyright is the appropriation tort, which prevents the use of someone else’s name or likeness for financial benefit. Unfortunately, the law has developed in a way that is often ineffective against the type of privacy threats now cropping up. Copyright primarily functions as a form of property right, protecting works of self-expression, such as a song or painting. To cope with increased threats to privacy, the scope of the appropriation tort should be expanded.
  •  
    Young people share the most intimate details of personal life on social-networking Web sites, such as MySpace and Facebook, portending a realignment of the public and the private. A post on YouTube can provoke global ridicule with the press of a return key. Social networks are forcing us to redefine what is truly private and what is public.
Anne Bubnic

Public Humiiation or Net Safety Ed? - 0 views

  •  
    Anne Collier recounts the saga of the Windsor High School teen who was recently singled out at a school assembly meant to warn students about the dangers of providing too much personal profile information on MySpace. She asks us for input on whether we think this is effective cybersafety training - or a form of public humiliation.
Anne Bubnic

Parents to File Grievances over MySpace School Assembly - 0 views

  •  
    A group of eight Windsor High School parents will file grievances with Re-4 School district in the wake of an Internet safety assembly that saw one girl leave in tears. The eight parents came together feeling nothing has been done since several high school students and their MySpace pages were used in an Internet safety presentation by Cheyenne Police Department officer John Gay on Aug. 19, the first day of school in the Windsor-Severance Re-4 School District.
Anne Bubnic

What Does COPPA Mean or Your Schools? - 0 views

  •  
    The Children's Online Privacy Protection Act (COPPA) is the key privacy regulation that protects children from having information about them collected by web site owners. In effect since April 2000, COPPA prohibits a web site owner or operator from "knowingly collecting information from children under the age of 13 unless the operator obtains parental consent and allows parents to review their children's information and restrict its further use."
Anne Bubnic

Teachers and Facebook: Privacy vs. standards - 0 views

  • An attorney for a suspended Charlotte-Mecklenburg Schools teacher said Thursday she never intended for the public to view negative comments she made about students on Facebook. But the case is now part of a national debate that pits teachers' right to free expression against how communities expect them to behave.
  • She now faces possible firing for listing “teaching chitlins in the ghetto of Charlotte” among her activities.
  • e district allows teachers to post personal information online, but had to take action because it affected the teacher's ability to interact with students and parents. She called the comments racially insensitive or offensive to students at Thomasboro Elementary School, where she teaches.
  •  
    An attorney for a suspended Charlotte-Mecklenburg Schools teacher said Thursday she never intended for the public to view negative comments she made about students on Facebook. But the case is now part of a national debate that pits teachers' right to free expression against how communities expect them to behave.
Anne Bubnic

Data scams have kicked into high gear as markets tumble - 0 views

  •  
    Cybercriminals have launched a massive new wave of Internet-based schemes to steal personal data and carry out financial scams in an effort to take advantage of the fear and confusion created by tumbling financial markets, security specialists say.
Anne Bubnic

Sheriff's Deputies prowl the Web for cyber bully - 0 views

  •  
    Court order sent to YouTube in Spalla hacking incident
Anne Bubnic

MySpace vs. Facebook Safety - 0 views

  • Not only is their goal to ensure the safety of minors but also to protect particular adult groups such as gender-specific, age-specific and multi-cultural groups.
  •  
    A comparison of MySpace and FaceBook Safety Features
Anne Bubnic

The spread of our 'digital footprint' - 0 views

  •  
    You may think that because you uploaded a piece of information about yourself, that you can control it, but your digital footprint may be harder to manage than you may think.
JOSEPH SAVIRIMUTHU

Police find difficulties investigating Internet harassment - 0 views

  • A local woman believes her story illustrates just how frustrating it can sometimes be fighting Internet harassment.   Tina Austin claims someone harassed her by posting information on the popular trading website, craigslist.org, last February.   The postings gave Austin’s name and work cell phone number.   The three separate postings claimed Austin was giving away a diamond necklace, a Chevy Suburban, and another which was, let’s just say an “R” rated request.   “I ended up getting [the most phone calls for the diamond necklace],“ Austin said Wednesday.  “[I didn’t get] quite as much for the Suburban.“
  •  
    Story of a woman who was harrassed through repeated CraigsList postings and fake ads directing people to her phone number.
Anne Bubnic

MySpace: How Much Information is Too Much Information? - 0 views

  •  
    The folks at Dateline created this mock MYSPACE page to illustrate how information can become too much information. Roll your mouse over each part of the profile, to see why the information is potentially dangerous. This model could be used to open a great dialogue with students on cybersafety and privacy practices.
Anne Bubnic

The Future of Reputation: Gossip, Rumor & Privacy on the Internet - 0 views

  •  
    Teeming with chatrooms, online discussion groups, and blogs, the Internet offers previously unimagined opportunities for personal expression and communication. But there's a dark side to the story. A trail of information fragments about us is forever preserved on the Internet, instantly available in a Google search. A permanent chronicle of our private lives-often of dubious reliability and sometimes totally false-will follow us wherever we go, accessible to friends, strangers, dates, employers, neighbors, relatives, and anyone else who cares to look.
  • ...1 more comment...
  •  
    John Paulfrey (Berkman Center) provides a review of the book, here.
  •  
    John Paulfrey (Berkman Center) provides a review of the book in his blog, here.
  •  
    John Palfrey (Berkman Center) provides a review of the book on his blog, here.
Anne Bubnic

Privacy Playground: The First Adventure of the Three CyberPigs - 0 views

  •  
    Privacy Playground: The First Adventure of the Three Little CyberPigs was developed by the Media Awareness Network. In this game, designed for ages 8-10, the CyberPigs play on their favourite Web site and encounter marketing ploys, spam and a close encounter with a not-too-friendly wolf. The purpose of the game is to teach kids how to spot online marketing strategies, protect their personal information and avoid online predators. The accompanying Teacher's Guide explains how to play the game, gives background information on the issues of online marketing, spam and children's privacy and provides activities and handouts for classroom use.
Anne Bubnic

The Beehive - 0 views

  •  
    Symantec partnered with One Economy to add Internet Security content to their online information portal, The Beehive. This resource ensures that low-income families and new broadband users have the tools and resources necessary to protect their families.
Anne Bubnic

FTC Tools for Teachers - 0 views

  •  
    Thirteen downloadable files from the Federal Trade Commission on protecting student privacy online.
« First ‹ Previous 1821 - 1840 of 2333 Next › Last »
Showing 20 items per page