Skip to main content

Home/ edtech335s12/ Group items tagged more

Rss Feed Group items tagged

Lindsay Mullen

STOP cyberbullying: Direct attacks - 0 views

  • 1. Instant Messaging/Text Messaging Harassment [Learn More...] 2. Stealing Passwords [Learn More...] 3. Blogs [Learn More...] 4. Web Sites [Learn More...] 5. Sending Pictures through E-mail and Cell Phones [Learn More...] 6. Internet Polling [Learn More...] 7. Interactive Gaming [Learn More...] 8. Sending Malicious Code [Learn More...] 9. Sending Porn and Other Junk E-Mail and IMs [Learn More...] 10. Impersonation
  • 1. Instant Messaging/Text Messaging Harassment
  • 2. Stealing passwords
  • ...2 more annotations...
  • 1. Instant Messaging/Text Messaging Harassment
  • Impersonation [Learn More...]
  •  
    Explains direct attacks (one of the two cases of cyberbullying)
Jason Holman

9 Ways Students Can Use Social Media to Boost Their Careers - 4 views

  • connect directly to friends
  • interacting on social networks with an eye toward your career is different than doing so for purely personal reasons.
  • Using social media for professional purposes doesn’t mean you have to give that up
  • ...6 more annotations...
  • refining your language, highlighting content and information that’s more career-focused, and connecting and conversing with more people outside your immediate group of friends signifies that you’re interested in more than just the personal.
  • connect with a wide-range of people with little effort and to organize those connections — through lists, circles or groups — so you can use them more effectively.
  • 3. It Can Help You Find a Job
  • 7. Strut Your Stuff
  • showcase your knowledge
  • By tweeting relevant articles, or commenting on industry trends on a personal blog, you can show your own level of interest and personal development outside of classwork and internships.
  •  
    Ways to boost careers using social media
Lindsay Mullen

STOP cyberbullying: Google yourself! - 0 views

  • Google is the search engine and information gathering phenomenon that collects bits and pieces of information available online.
  • As more and more of us are using the Internet to communicate and share our ideas, more and more of our personal information is posted online
  • The ramifications of having your personal information posted online can be very serious. Just think about it.
  • ...3 more annotations...
  • If you find that your personal contact information appears when you don’t want it to appear, you can ask Google to disable the information
  • You would also need to reach out to the site or online service and ask for it to be removed from wherever it’s posted
  • children’s information is posted online, and they are under the age of thirteen, notify the Web site or online service that your children are under thirteen and that COPPA (the Children’s Online Privacy Protection Act) requires that they remove the information immediately
  •  
    Way to look for information that you may not want available to the public. Also this provides ways of removing that information from the public web
Lindsay Mullen

STOP cyberbullying: Telling the difference - 0 views

  • Telling the difference between flaming, cyber-bullying and harassment and cyberstalking (A guide for law enforcement)
  • It’s not always easy to tell these apart, except for serious cases of cyberstalking, when you “know it when you see it.” And the only difference between “cyberbullying” and cyber-harassment is the age of both the victim and the perpetrator. They both have to be under-age
  • But the closer it comes to real life threats the more likely you have to get involved as law enforcement
  • ...6 more annotations...
  • We recommend that law enforcement agents ask parents the following questions. Their answers will help guide you when to get involved and when to recommend another course of action.
  • The kind of threat:
  • The frequency of the threats:
  • The source of the threats
  • The nature of the threats:
  • The more repeated the communications are, the greater the threats (or enlarging this to include third-parties) and the more dangerous the methods, the more likely law enforcement or legal process needs to be used. If personal contact information is being shared online, this must be treated very seriously.
  •  
    Way to identify whether a situation is a case of cyberbullying or not
Jeremy Rice

Free Translation and Professional Translation Services from SDL - 0 views

  •  
    This is a good resource with there being more and more people that are spanish speaking now.
Lindsay Mullen

STOP cyberbullying: Cyberbullying by proxy - 0 views

  • T he
  • Cyberbullying by proxy is when a cyberbully gets someone else to do their dirty work. Most of the time they are unwitting accomplices and don't know that they are being used by the cyberbully. Cyberbullying by proxy is the most dangerous kind of cyberbullying because it often gets adults involved in the harassment and people who don't know they are dealing with a kid or someone they know.
  • "Warning" or "Notify Wars" are an example of cyberbullying by proxy. Kids click on the warning or notify buttons on their IM screen or e-mail or chat screens, and alert the ISP or service provider that the victim has done something that violates their rules
  • ...13 more annotations...
  • The most typical way a cyberbullying by proxy attack occurs is when the cyberbully gets control of the victim's account and sends out hateful or rude messages to everyone on their buddy list pretending to be the victim
  • Cyberbullying by proxy sometimes starts with the cyberbully posing as the victim
  • If the cyberbully can make it look like the victim is doing something wrong, and the parents are notified, the parents will punish the victim
  • For example...
  • For example
  • Sometimes the cyberbully tries to get more people involved
  • For example
  • For example...
  • For example
  • Sometimes it is much more serious than that. When cyberbullies want to get others to do their dirty work quickly, they often post information about, or pose as, their victim in hate group chat rooms and on their discussion boards
  • ). For example
  • In cases of cyberbullying by proxy, when hate or child molester groups are involved, the victim is in danger of physical harm and law enforcement must be contacted immediately.
  • Can you think of examples of cyberbullying by proxy?
  •  
    Explains cyberbullying by proxy (one of the two types of cyberbullying)
Megan Duke

Mary Ann Rankin: Why America Needs Good Teachers - 0 views

  • shows that teachers can change the trajectory of their students' lives. Students of capable elementary and middle school teachers not only have higher standardized test scores, they are more likely to attend college, have a lower incidence of high school pregnancy, and earn more as adults.
  • As the global economy quickly changes, countries that can stay ahead in areas such as engineering, chemistry, and technology will be the most competitive. Yet, the hard sciences are among the most challenging subjects for even the best instructors to teach. Worse, Education Trust studies have shown that troubling numbers of math and science teachers never studied the subjects they are teaching.
  • An increased emphasis on good teachers who can provide high quality math and science education should be a top priority for America's educational community and our political leaders. This is not just for the sake of raising standardized test scores, but because we understand the direct correlation between mastering essential subject matter and the success of our students and the country.
holli gattshall

tehnology in the English class - 0 views

  •  
    i found a couple things in this article that I could use in the future in my high school english classes.
Lindsay Mullen

STOP cyberbullying: Preventing cyberbullying - 0 views

  • Educating the kids about the consequences (losing their ISP or IM accounts) helps. Teaching them to respect others and to take a stand against bullying of all kinds helps too
  • Unfortunately, there is no "one size fits all" when cyberbullying is concerned
  • When schools try and get involved by disciplining the student for cyberbullying actions that took place off-campus and outside of school hours, they are often sued for exceeding their authority and violating the student's free speech right. [Learn more...]
  • ...1 more annotation...
  • Parents need to be the one trusted place kids can go when things go wrong online and offline. Yet they often are the one place kids avoid when things go wrong online
  •  
    Ways of prevention
Lindsay Mullen

STOP cyberbullying: How cyberbullying works - 0 views

  • Direct Attacks
  • There are two kinds of cyberbullying, direct attacks (messages sent to your kids directly) and cyberbullying by proxy (using others to help cyberbully the victim, either with or without the accomplice's knowledge). Because cyberbullying by proxy often gets adults involved in the harassment, it is much more dangerous.
  •  
    Explains how exactly cyberbullying works
Lindsay Mullen

STOP cyberbullying: What is cyberbullying, exactly? - 0 views

  • "Cyberbullying" is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the Internet, interactive and digital technologies or mobile phones
  • The methods used are limited only by the child's imagination and access to technology
  • Children have killed each other and committed suicide after having been involved in a cyberbullying incident
  • ...5 more annotations...
  • Cyberbullying is usually not a one time communication, unless it involves a death threat or a credible threat of serious bodily harm. Kids usually know it when they see it, while parents may be more worried about the lewd language used by the kids than the hurtful effect of rude and embarrassing posts.
  • Cyberbullying may rise to the level of a misdemeanor cyberharassment charge, or if the child is young enough may result in the charge of juvenile delinquency
  • It typically can result in a child losing their ISP or IM accounts as a terms of service violation. And in some cases, if hacking or password and identity theft is involved, can be a serious criminal matter under state and federal law.
  • When schools try and get involved by disciplining the student for cyberbullying actions that took place off-campus and outside of school hours, they are often sued for exceeding their authority and violating the student's free speech right.
  • Schools can be very effective brokers in working with the parents to stop and remedy cyberbullying situations
  •  
    The definition and further explanation of cyberbullying
Trevor Tom

More Schools Embrace the iPad as a Learning Tool - NYTimes.com - 0 views

  •  
    School uses iPad to bring technology into classroom. Students are being able to replace textbooks with iPads
kayla sowers

What is a Smart Board? - 1 views

  •  
    This site will help me better uderstand how to use and create lessons using a smart board.
shelby doane

Education Articles - 0 views

  • ADHD is in epidemic proportions in our children. While this may sound like a panic statement it is not intended to incite panic. It doesn’t even have to be a crisis, except that children with ADHD test the educational system at every turn. And the educational system is failing these children. Our answer to this seems to be to blame the students, medicate them, and insist that they continue in the system that is not equipped to handle them.
  • This is the dilemma facing may schools today. Institutional school settings are based on a model of children from a different era. Children today, even those without ADHD, seem to be wired differently from the students of one hundred years ago. From a very early age we bombard them with stimulation. Before a baby can even turn over by themselves they have music, lights, and sound in their cribs, in the form of toys, mobiles, and stuffed animals that make noises or lullabies. By the time they are toddling, many of their toys make sound, light up, or move.
  • Institutional school settings are based on a model of children from a different era
  • ...1 more annotation...
  • . Children today, even those without ADHD, seem to be wired differently from the students of one hundred years ago. From a very early age we bombard them with stimulation
  •  
    A article that talks about ADHD.
  •  
    My brother has severe ADHD. I don't believe the flashing lights and such of toys really play into how easily distracted ADHD students are. Noises such as a drop of a pencil can distract them which probably happened 100 years ago just now we're more aware and educated with mental health. His teacher does things that makes games with a trampoline.
John Shaw

8 Ways Technology Is Improving Education - 0 views

    • John Shaw
       
      This is a very true statement. For the younger generation is becoming more in to the world of computers.
  • Technology is helping teachers to expand beyond linear, text-based learning and to engage students who learn best in other ways. Its role in schools has evolved from a contained “computer class” into a versatile learning tool that could change how we demonstrate concepts, assign projects and assess progress.
  •  
    How Technology is slowly changing the ways we use classrooms now of days. Is this good or bad for our students today?
Bethany Beckett

NDEP - National Deaf Education Project - 0 views

    • Bethany Beckett
       
      Important change in laws for deaf children
  • The law was in effect as of May 1996, and its rules for implementation were adopted in May of 1997. All IEPs being developed are required to
  • What will be the impact of the Deaf Child's Bill of Rights on my child's education? An outcome of the Deaf Child's Bill of Rights is that your child's IEP (Individual Education Plan) will be directly affected by this law in the form of a "Communication Plan". The Communication Plan is the document referred to in the rules that contains an action plan that the IEP team (especially parents) has created to address specific areas of a student's social and emotional development. All too often, IEPs do not thoroughly address, if at all, these critical areas of growth for a child who is deaf or hard of hearing. The Communication Plan creates a mechanism for having conversations and taking action where gaps are identified in these areas. And the Communication Plan will serve as a quality control monitor, making sure that a more comprehensive, qualitative view is taken of each child's experience in school.
  • ...5 more annotations...
  • When will the law take effect and when will my child have his/her own "Communication Plan".
  • What is the Deaf Child's Bill of Rights? In May of 1996, the General Assembly approved Colorado State Law 96-1041, The Deaf Child's Bill of Rights. The Bill, sponsored by Representative Mo Keller, who is an educator of the deaf, was strongly supported by parents of children who are deaf or hard of hearing, and members of the deaf community. With its passage, program options for deaf students in the state of Colorado have been strengthened and preserved. In light of numerous states nationwide that have eliminated program options in favor of full inclusion models, the passage of 1041 is considered a victory indeed for deaf and hard of hearing students who benefit from options.
  • ng consistently. Neve
  • include a Communication Plan. Still, it's not happen
  • rtheless, we encourage parents to take the initiative and team with your IEP staff to create a Communication Plan for your child at your next
  •  
    Deaf students/children reforms. the new bill of rights for the deaf.
Brian K

Welcome to The Center for Teaching History with Technology - 0 views

shared by Brian K on 19 Jan 12 - No Cached
  • The Center for Teaching History with Technology, a resource created to help K-12 history and social studies teachers incorporate technology effectively into their courses. Find resources for history and social studies lesson plans, activities, projects, games, and quizzes that use technology. Explore inquiry-based lessons, activities, and projects. Learn about web technologies such as blogs, podcasts, wikis, social networks, Google Docs, ebooks, online maps, virtual field trips, screencasts, online posters, and more. Explore innnovative ways of integrating these tools into the curriculum, watch instructional video tutorials, and learn how others are using technology in the classroom!
    • Brian K
       
      This website already sounds like a useful tool !
Jason Holman

New Math-to-Speech Technologies to Help Blind and Visually Impaired Students Master Mat... - 0 views

  • This new math-to-speech technology will provide students who are blind or have other visual impairments, the tools they need to learn, practice, and take math and science tests on a more equal footing with their classroom peers.
  • replay voiced segments in mathematically meaningful ‘chunks.’ Our goal is to provide students and teachers with a better system for voicing mathematical notation that includes some truly useful functionality.”
  •  
    Interesting
Morgan Roberts

REC: Inclusive Classroom - 0 views

  • The Learning Experiences and Planning Options pages will support you as you make long-range and short-term plans for all the children and their learning environment. The Articles, Websites, Professional Books, and Terminology sections will point you to invaluable information that will help you learn more about meeting the learning needs of all your young children.
    • Morgan Roberts
       
      Useful tools to use and to put on my Wikispaces page
1 - 19 of 19
Showing 20 items per page