Online Safety 3.0: Empowering and Protecting Youth | ConnectSafelyConnectSafely - 2 views
-
"Both the Internet and the way young people use technology are constantly changing, but Internet safety messages change very slowly if at all. A few years ago, some of us in the Net safety community started talking about how to adjust our messaging for the much more interactive "Web 2.0." And we did so, based on the latest research as it emerged. But even those messages are starting to get a bit stale…. Now it's time for Online Safety 3.0."
NetSafe - Learn | Guide | Protect - 5 views
Free Technology for Teachers: Protect Student Privacy by Using Skitch - 2 views
A Principal's Reflections: Protecting Kids During and After Remote Learning - 2 views
Copyright Decision Tool - CMEC - 6 views
How to Integrate Growth Mindset Messages Into Every Part of Math Class | MindShift | KQ... - 1 views
-
"Catherine Good has experienced stereotype threat herself, although she didn't know it at the time. She started her academic career in pure math, expecting to get a Ph.D. But somewhere along the way she started to feel like it just wasn't for her, even though she was doing well in all her classes. Thinking that she'd just chosen the wrong application for her love of math, Good switched to math education, where she first encountered the idea of stereotype threat from a guest psychology speaker. "As he talked about students feeling that they don't really belong, I had an epiphany," Good said. She realized the discomfort she'd felt studying mathematics had nothing to do with her ability or qualifications and everything to do with a vague sense that she didn't belong in a field dominated by men. Stereotype threat is a term coined by psychologists Joshua Aronson and Claude Steele. They found that pervasive cultural stereotypes that marginalize groups, like "girls aren't good at math," create a threatening environment and affects academic achievement. Good was so fascinated by how powerful psychological forces can be on learning, including her own, that she switched fields again to study social psychology, and she ended up working closely with Carol Dweck for several years when Dweck's growth mindset work was in its early stages and not yet well-known among educators. Good now works at a psychology professor at Baruch College. Originally, Dweck and Good hypothesized that believing intelligence is flexible - what we now call a growth mindset - could protect students from stereotype threat, an inherently fixed idea."
What a School District Designed for Computational Thinking Looks Like | MindShift | KQE... - 0 views
-
"Computational thinking is intimately related to computer coding, which every kid in South Fayette starts learning in first grade. But they are not one and the same. At its core, computational thinking means breaking complex challenges into smaller questions that can be solved with a computer's number crunching, data compiling and sorting capabilities. Proponents say it's a problem-solving approach that works in any field, noting that computer modeling, big data and simulations are used in everything from textual analysis to medical research and environmental protection."
What to do if asked to hand over your phone, computer at the US border - Business Insider - 4 views
-
"When you're entering the United States, whether at an airport or a border crossing, federal agents have broad authority to search citizens and visitors alike. And that can include flipping through your phone, computer, and any other electronic devices you have with you. As US Customs and Border Protection outlines in a tearsheet it provides to people at the border, federal agents can seize and search your phone, and even make a copy of it to have forensic experts analyze its contents off-site."
Protect Your Students' Data and Privacy | Common Sense Education - 0 views
Protecting Student Privacy on Social Media: Do's and Don'ts for Teachers | Common Sense... - 3 views
Great Tools to Create Protected Blogs and Web pages for your Class - 0 views
Online Safety Tips and Tools to Protect Kids and Inform Parents about Internet dangers - 0 views
How to Set up iPad Restrictions | htacademy - 0 views
-
"Does your child have an iOS device (iPad, iPhone, or iPod Touch) or access to your personal device? iOS devices have many security features that parents don't know about. You can use these features to help protect your child from accessing inappropriate content; guard your personal data on a shared device; and safeguard you from unexpected credit card bills due to unapproved app and itunes purchases. The following video explains how!"
‹ Previous
21 - 40 of 144
Next ›
Last »
Showing 20▼ items per page