Skip to main content

Home/ Groups/ edtech335s12
Lindsay Mullen

STOP cyberbullying: What is cyberbullying, exactly? - 0 views

  • "Cyberbullying" is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the Internet, interactive and digital technologies or mobile phones
  • The methods used are limited only by the child's imagination and access to technology
  • Children have killed each other and committed suicide after having been involved in a cyberbullying incident
  • ...5 more annotations...
  • Cyberbullying is usually not a one time communication, unless it involves a death threat or a credible threat of serious bodily harm. Kids usually know it when they see it, while parents may be more worried about the lewd language used by the kids than the hurtful effect of rude and embarrassing posts.
  • Cyberbullying may rise to the level of a misdemeanor cyberharassment charge, or if the child is young enough may result in the charge of juvenile delinquency
  • It typically can result in a child losing their ISP or IM accounts as a terms of service violation. And in some cases, if hacking or password and identity theft is involved, can be a serious criminal matter under state and federal law.
  • When schools try and get involved by disciplining the student for cyberbullying actions that took place off-campus and outside of school hours, they are often sued for exceeding their authority and violating the student's free speech right.
  • Schools can be very effective brokers in working with the parents to stop and remedy cyberbullying situations
  •  
    The definition and further explanation of cyberbullying
Lindsay Mullen

STOP cyberbullying: How cyberbullying works - 0 views

  • Direct Attacks
  • There are two kinds of cyberbullying, direct attacks (messages sent to your kids directly) and cyberbullying by proxy (using others to help cyberbully the victim, either with or without the accomplice's knowledge). Because cyberbullying by proxy often gets adults involved in the harassment, it is much more dangerous.
  •  
    Explains how exactly cyberbullying works
Lindsay Mullen

STOP cyberbullying: Direct attacks - 0 views

  • 1. Instant Messaging/Text Messaging Harassment [Learn More...] 2. Stealing Passwords [Learn More...] 3. Blogs [Learn More...] 4. Web Sites [Learn More...] 5. Sending Pictures through E-mail and Cell Phones [Learn More...] 6. Internet Polling [Learn More...] 7. Interactive Gaming [Learn More...] 8. Sending Malicious Code [Learn More...] 9. Sending Porn and Other Junk E-Mail and IMs [Learn More...] 10. Impersonation
  • 1. Instant Messaging/Text Messaging Harassment
  • 2. Stealing passwords
  • ...2 more annotations...
  • 1. Instant Messaging/Text Messaging Harassment
  • Impersonation [Learn More...]
  •  
    Explains direct attacks (one of the two cases of cyberbullying)
Lindsay Mullen

STOP cyberbullying: Cyberbullying by proxy - 0 views

  • T he
  • Cyberbullying by proxy is when a cyberbully gets someone else to do their dirty work. Most of the time they are unwitting accomplices and don't know that they are being used by the cyberbully. Cyberbullying by proxy is the most dangerous kind of cyberbullying because it often gets adults involved in the harassment and people who don't know they are dealing with a kid or someone they know.
  • "Warning" or "Notify Wars" are an example of cyberbullying by proxy. Kids click on the warning or notify buttons on their IM screen or e-mail or chat screens, and alert the ISP or service provider that the victim has done something that violates their rules
  • ...13 more annotations...
  • The most typical way a cyberbullying by proxy attack occurs is when the cyberbully gets control of the victim's account and sends out hateful or rude messages to everyone on their buddy list pretending to be the victim
  • Cyberbullying by proxy sometimes starts with the cyberbully posing as the victim
  • If the cyberbully can make it look like the victim is doing something wrong, and the parents are notified, the parents will punish the victim
  • For example...
  • For example
  • Sometimes the cyberbully tries to get more people involved
  • For example
  • For example...
  • For example
  • Sometimes it is much more serious than that. When cyberbullies want to get others to do their dirty work quickly, they often post information about, or pose as, their victim in hate group chat rooms and on their discussion boards
  • ). For example
  • In cases of cyberbullying by proxy, when hate or child molester groups are involved, the victim is in danger of physical harm and law enforcement must be contacted immediately.
  • Can you think of examples of cyberbullying by proxy?
  •  
    Explains cyberbullying by proxy (one of the two types of cyberbullying)
Lindsay Mullen

STOP cyberbullying: Why do kids cyberbully each other? - 0 views

  • When it comes to cyberbullying, they are often motivated by anger, revenge or frustration.
  • Who knows why kids do anything? When it comes to cyberbullying, they are often motivated by anger, revenge or frustration. Sometimes they do it for entertainment or because they are bored and have too much time on their hands and too many tech toys available to them . Many do it for laughs or to get a reaction. Some do it by accident, and either send a message to the wrong recipient or didn't think before they did something. The Power-hungry do it to torment others and for their ego . Revenge of the nerd may start out defending themselves from traditional bullying only to find that they enjoy being the tough guy or gal. Mean girls do it to help bolster or remind people of their own social standing. And some think they are righting wrong and standing up for others.
  • Sometimes they do it for entertainment or because they are bored and have too much time on their hands and too many tech toys available to them
  • ...3 more annotations...
  • Power-hungry do it to torment others and for their ego
  • the solutions and responses to each type of cyberbullying incident has to differ
  • But the motives and the nature of cybercommunications, as well as the demographic and profile of a cyberbully differ from their offline counterpart
  •  
    Explains different reasons as to why kids cyberbully each other
Lindsay Mullen

STOP cyberbullying: Preventing cyberbullying - 0 views

  • Educating the kids about the consequences (losing their ISP or IM accounts) helps. Teaching them to respect others and to take a stand against bullying of all kinds helps too
  • Unfortunately, there is no "one size fits all" when cyberbullying is concerned
  • When schools try and get involved by disciplining the student for cyberbullying actions that took place off-campus and outside of school hours, they are often sued for exceeding their authority and violating the student's free speech right. [Learn more...]
  • ...1 more annotation...
  • Parents need to be the one trusted place kids can go when things go wrong online and offline. Yet they often are the one place kids avoid when things go wrong online
  •  
    Ways of prevention
Lindsay Mullen

STOP cyberbullying: The School's role - 0 views

  • What is the school's role in this?
  • What is the school's role in this?
  • Schools can be very effective brokers in working with the parents to stop and remedy cyberbullying situations
  • ...2 more annotations...
  • They can also educate the students on cyberethics and the law
  • If schools are creative, they can sometimes avoid the claim that their actions exceeded their legal authority for off-campus cyberbullying actions
  •  
    Identifying what exactly the school's role(s) are in a case of cyberbullying
Lindsay Mullen

STOP cyberbullying: A Parent's Role - 0 views

  • What's the Parents' Role in This?
  • Parents need to be the one trusted place kids can go when things go wrong online and offline. Yet they often are the one place kids avoid when things go wrong online
  • Most children will avoid telling their parents about a cyberbullying incident fearing they will only make things worse
  • ...5 more annotations...
  • Parents need to be supportive of your child during this time
  • Don't brush it off.
  • It is crucial that you are there to provide the necessary support and love. Make them feel secure
  • Parents also need to understand that a child is just as likely to be a cyberbully as a victim of cyberbullying and often go back and forth between the two roles during one incident
  • If there is any indication that personal contact information has been posted online, or any threats are made to your child, you must run.do not walk, to your local law enforcement agency (not the FBI).
  •  
    Identifying a parent's role(s) when it comes to a case of cyberbullying
Lindsay Mullen

STOP cyberbullying: Telling the difference - 0 views

  • Telling the difference between flaming, cyber-bullying and harassment and cyberstalking (A guide for law enforcement)
  • It’s not always easy to tell these apart, except for serious cases of cyberstalking, when you “know it when you see it.” And the only difference between “cyberbullying” and cyber-harassment is the age of both the victim and the perpetrator. They both have to be under-age
  • But the closer it comes to real life threats the more likely you have to get involved as law enforcement
  • ...6 more annotations...
  • We recommend that law enforcement agents ask parents the following questions. Their answers will help guide you when to get involved and when to recommend another course of action.
  • The kind of threat:
  • The frequency of the threats:
  • The source of the threats
  • The nature of the threats:
  • The more repeated the communications are, the greater the threats (or enlarging this to include third-parties) and the more dangerous the methods, the more likely law enforcement or legal process needs to be used. If personal contact information is being shared online, this must be treated very seriously.
  •  
    Way to identify whether a situation is a case of cyberbullying or not
Lindsay Mullen

STOP cyberbullying: Google yourself! - 0 views

  • Google is the search engine and information gathering phenomenon that collects bits and pieces of information available online.
  • As more and more of us are using the Internet to communicate and share our ideas, more and more of our personal information is posted online
  • The ramifications of having your personal information posted online can be very serious. Just think about it.
  • ...3 more annotations...
  • If you find that your personal contact information appears when you don’t want it to appear, you can ask Google to disable the information
  • You would also need to reach out to the site or online service and ask for it to be removed from wherever it’s posted
  • children’s information is posted online, and they are under the age of thirteen, notify the Web site or online service that your children are under thirteen and that COPPA (the Children’s Online Privacy Protection Act) requires that they remove the information immediately
  •  
    Way to look for information that you may not want available to the public. Also this provides ways of removing that information from the public web
Eric Calvert

Best Educational Wikis of 2011 - 0 views

  •  
    Examples of educational wikis from the 2011 Edublog Awards.
Jason Holman

9 Ways Students Can Use Social Media to Boost Their Careers - 4 views

  • connect directly to friends
  • interacting on social networks with an eye toward your career is different than doing so for purely personal reasons.
  • Using social media for professional purposes doesn’t mean you have to give that up
  • ...6 more annotations...
  • refining your language, highlighting content and information that’s more career-focused, and connecting and conversing with more people outside your immediate group of friends signifies that you’re interested in more than just the personal.
  • connect with a wide-range of people with little effort and to organize those connections — through lists, circles or groups — so you can use them more effectively.
  • 3. It Can Help You Find a Job
  • 7. Strut Your Stuff
  • showcase your knowledge
  • By tweeting relevant articles, or commenting on industry trends on a personal blog, you can show your own level of interest and personal development outside of classwork and internships.
  •  
    Ways to boost careers using social media
Jason Holman

US seeks to mine social media to predict future | Information, Gadgets, Mobile Phones N... - 0 views

  •  
    Social media impact on future
Morgan Roberts

REC: Inclusive Classroom - 0 views

  • The Learning Experiences and Planning Options pages will support you as you make long-range and short-term plans for all the children and their learning environment. The Articles, Websites, Professional Books, and Terminology sections will point you to invaluable information that will help you learn more about meeting the learning needs of all your young children.
    • Morgan Roberts
       
      Useful tools to use and to put on my Wikispaces page
Jason Holman

jasonholman - home - 0 views

  •  
    wiki
Eric Calvert

Wikispaces - For Educators - 1 views

  •  
    Use this page to create a free Wikispaces for Educators account. (This gives you the option of making your wiki private without having to pay the $5 monthly fee. Since we'll be building things for you to use in your future classrooms, you can click the button certifying you'll use it for K-12 Education with a clear conscience.)
Brittany Jackson

Teaching Resources for Spanish Class, Spanish4Teachers.org - 1 views

  • he modules you see below are organized by units, for an easy search.
  • Spanish Vocabulary Lists
  • Hispanic Culture
  •  
    It's a resource for Spanish Education.
Brittany Jackson

A Detective Game for Students of Spanish | OER Commons - 0 views

  • This is a unit on Spanish master painters. The lessons presented here are a part of the beginning unit. Each lesson is composed of art, literature, poetry, politics and history. This is a cooperative mystery game that can be adapted for any lesson on culture, geography, art and history.
  •  
    It's a game for speakers of another language. Primarily, Spanish-oriented in this application. But, can apply to other languages.
Brittany Jackson

Exploring Language and Identity: Amy Tan's "Mother Tongue" and Beyond | OER Commons - 0 views

  • How these “different Englishes” or even a language other than English contribute to identity is a crucial issue for adolescents.
  • Students then read and discuss Amy Tan's essay “Mother Tongue.” Finally, they write a literacy narrative describing two different languages they use and when and where they use these languages.
  •  
    It's about cultural identity. 
Julie Tucker

Curriki - 0 views

shared by Julie Tucker on 22 Jan 12 - Cached
  •  
    Curriculum ideas for every grade.
1 - 20 of 87 Next › Last »
Showing 20 items per page