Skip to main content

Home/ Ed Tech Crew/ Group items tagged cyber safety

Rss Feed Group items tagged

John Pearce

Who's responsible for tackling cyber bullying? - 0 views

  •  
    The issue of cyber bullying of school children goes to the zeitgeist of our age. It is a collision point between three competing forces: educating our children to be responsible, autonomous individuals; the intervention of the state; and the seemingly unfathomable reach of technology. This week the new Commonwealth Director of Cyber Safety Policy and Programs. begins sifting through the many submissions responding to the government's cyber safety discussion paper. Twenty years ago who would have even imagined such a position would need to exist?
  •  
    The issue of cyber bullying of school children goes to the zeitgeist of our age. It is a collision point between three competing forces: educating our children to be responsible, autonomous individuals; the intervention of the state; and the seemingly unfathomable reach of technology. This week the new Commonwealth Director of Cyber Safety Policy and Programs. begins sifting through the many submissions responding to the government's cyber safety discussion paper. Twenty years ago who would have even imagined such a position would need to exist?
Tony Richards

Joint Select Committee on Cyber-Safety - Report - 1 views

  •  
    On Monday 20 June 2011, the Joint Select Committee on Cyber-Safety tabled its report on the Inquiry into Cyber-Safety
John Pearce

Cyber Safety - Internet Safety Tips To Stay Safe Online : InformED - 5 views

  •  
    "The Internet is without a doubt one of the best resources available to us. Unfortunately it's also extremely dangerous if you aren't aware of who and what lurks behind the scenes. Everyone should know how to be safe when surfing the web, but internet safety tips and tricks are spread out all over the web without a go-to resource. Since the majority of internet scam and virus victims are students and young people, Open Colleges is a perfect place to post the very first full guide to being safe on the internet."
Rhondda Powling

Comics using comic life and drawplus - Resources - TES - 5 views

  •  
    Great little video tutorials that show how to construct comics in comic life but also working with drawplus to rip characters from one cartoon and embedding them in the other. All neatly wrapped up in a cyber bullying theme for a token nod to e-safety.
John Pearce

High-Wire Act Cyber-Safety and the Young - 1 views

  •  
    "The online environment is an integral part of modern economic and social activities, and a vast resource of education, information, communication and entertainment. Further, the evolution of new technologies is diversifying the ways in which Australians connect with each other and the world. As part of the Government's comprehensive commitment to cyber-safety, the Australian Parliament established this Committee in March 2010. This report focuses on how young people can be empowered and connect to the Internet, and use new technologies with confidence, knowing that they can use them safely, ethically and with full awareness of risks and benefits. The facilitation of safer online environments requires government, industry and the broader community to work together to realise the benefits of the online environment while also protecting Australians from dangers and enabling them to use existing and emerging tools to mitigate risks.  
John Pearce

Msg to mum: don't sweat the cyber stuff - 5 views

  •  
    "Cyber-bullying, update-addiction, sexting - from the perspective of a parent raising a ''digital native'' child, social media seems fraught with dangers. But new research suggests the risks inherent in social media use by younger generations might be overblown. danah boyd, assistant research professor at Harvard and principal researcher for Microsoft Research - like k.d.lang, she prefers the lower case - has completed a large-scale study on how US teenagers use the internet in general, and social media in particular. Her book is called It's Complicated, and is the result of in-depth interviews with scores of teens over an eight-year period."
John Pearce

Who is Spying On You? [infographic] - 3 views

  •  
    "I'm pretty sure that we're all aware of computer hackers. The real shocker comes with just how easy it is for hackers to steal your information. Today's infographic lets us regular folk know just how easy it is for our information to be tracked and potentially stolen. I have personally been guilty of being too trusting of public routers.  Since I don't have internet at home, I'll spend HOURS surfing the net, and getting personal things done at Mcdonalds, where the internet is free for the public to use. But not after reading today's infographic! It's crazy to realize that this entire time someone could have been cyber stalking my information! I'm going to have to beef up my antivirus and keep my internet time to a minimum. Seriously, for your personal and financial safety, read today's infographic and be protect your computer. The facts in today's infographic are too scary to ignore!"
John Pearce

Can a cyber-bullying commissioner protect our kids? - Law Report - ABC Radio National (... - 0 views

  •  
    "A federal government discussion paper has proposed the creation of a children's e-safety commissioner to help protect children from cyber-bullying on social media. However not everyone agrees on the proposal, which opponents say is a slippery slope to government censorship, writes Damien Carrick."
John Pearce

Cure The Bullies - 0 views

  •  
    A cyberbullying 'epidemic' has hit our shores and threatens to contaminate our children through emails, chatrooms, blogs, mobile phones and social networking sites. The Bullies are nasty, highly contagious viruses that lurk in cyberspace, infecting young cyber citizens with unacceptable online behaviours. And unfortunately, something seemingly innocent such as forwarding an unpleasant email to someone can cause instant contamination. But help is at hand. SchoolAid, in partnership with the Vodafone Foundation, has launched a national campaign that identifies and personifies the different types of cyberbullying behaviours, and in particular, bystander behaviour, to raise awareness of this crucial issue, while encouraging open discussion among children and adults alike.
John Pearce

Roxburgh Homestead Primary School defends classroom Twitter accounts for children | Her... - 5 views

  •  
    "A CYBER safety expert has slammed primary schools for letting students as young as eight use Twitter. Roxburgh Homestead Primary School is one of a number of schools to set up classroom Twitter accounts so students can share snippets of their work with the outside world. Parents have been encouraged to 'follow' the accounts for an insight into their children's school life."
Rhondda Powling

Winners of Trend Micro's 2011 "What's Your Story?" Internet Safety Video Contest Challe... - 3 views

  •  
    The annual "What's Your Story?" international video contest that empowers youth to be leaders in educating others about being safe online.
John Pearce

Digital storm on the horizon - 0 views

  •  
    "Michael Fraser calls it the ''rubbish web''. That is the internet we will be left with in five to 10 years unless governments and cyber corporations fix the holes that allow criminals to infiltrate the world wide web and strip global citizens of their identity, money and dignity, he believes. In his bleak view, those who can afford it will retreat behind private corporatised security walls."
Rhondda Powling

Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure - gust... - 0 views

  •  
    Developing policy/ies about BYOD question is becoming more important in schools. A lot of information is presented here, with videos. infographics and links.
Camilla Elliott

3 Step plan for a digital makeover - 2 views

  •  
    Includes excellent walk through activity.  From Lisa Neilson.
John Pearce

Technology Infographics: Social Media Privacy, Cyber Security and More | Veracode Blog - 6 views

  •  
    Veracode Security Blog: Application security research, security trends and opinions » INFOGRAPHICS
1 - 17 of 17
Showing 20 items per page