Skip to main content

Home/ educators/ Group items tagged internet safety

Rss Feed Group items tagged

Dave Truss

NetSmartzKids: UYN - 6 views

  •  
    Looks like a good site to introduce kids to internet safety
Dave Truss

Stumbling Blocks: Playing It Too Safe Will Make You Sorry | Edutopia - 0 views

  • "We need to create places where teachers can take chances," Honeycutt says. “Every district needs to anoint some teachers to play with Web 2.0 tools in a safe, hypothetical environment. I call it taming the tool. Teachers need time to consider, 'Under what conditions would we allow this tool into the classroom?'"
  • “We realized that students don't see these as impediments, but rather as challenges,” Canuel says. "Students find ingenious ways to go around them." Rather than fighting to stay a step ahead of tech-savvy pupils, the district emphasizes online safety and digital citizenship.
  • Instruction in digital citizenship needs to start early,
  • ...1 more annotation...
  • In the still-evolving Web 2.0 era, anyone with Internet access has the power to create and publish content online and interact with content others have created.
  •  
    Content filters and firewalls are great for keeping kids away from pornography, as required by the Children's Internet Protection Act, or preventing them from updating their Facebook status during class. But the same filters can stop teachers from accessing cutting-edge widgets and digital materials that have enormous potential for expanding learning.
Martin Burrett

Save The Pacific Northwest Tree Octopus - 2 views

  •  
    A wildlife conservation site which aims to save the rare Pacific Northwest tree octopus from extinction... except it isn't. A great site to use that illustrates that not all information on the web can be trusted. http://ictmagic.wikispaces.com/ICT+%26+Web+Tools
Jocelyn Chappell

Safer Children in a Byron World | Aylesbury LIFE - 0 views

  • "Safer Children in a Digital World", requested by UK PM
  • a sudden outbreak of common sense.
  • To give you a flavour I quote: "At a public swimming pool we have gates, put up signs, have lifeguards and shallow ends, but we also teach children how to swim." Oh, so we don't drain the swimming pool of water, then?!
  •  
    This is just a flier introducing report requested by UK PM and authored by child psychologist. The report itself is quite long -- I dare say I will blog again when I have read it.
  •  
    Just blogged this: a new UK perspective on child safety online more objective than most -- a sudden outbreak of common sense even -- let us hope it prevails
Vicki Davis

Children's Way - Teaching Kids and Parents Internet Safety - 0 views

  •  
    Great place for online safety - sign up for a school account.
  •  
    I highly recommend that elementary and middle schools at least sign up for a school code for woogi world - this is a great tool suggested by Hoover City schools for teaching digital citizenship. My daughter (my intrepid tester of all kid virtual worlds) loves it and says she thinks it is great for kids.
Jocelyn Chappell

How Dangerous Is the Internet for Children? - Pogue's Posts - Technology - New York Tim... - 0 views

  •  
    David Pogue write in The New York Times, "As my own children approach middle school, my own fears align with the documentary's findings in another way: that cyber-bullying is a far more realistic threat. "
Vicki Davis

Social networks and kids: How young is too young? - CNN.com - 13 views

  • a growing number of children are flouting age requirements on sites such as Facebook and MySpace, or using social-networking sites designed just for them.
  • which some therapists have linked to Internet addiction among adults
  • In two surveys reported this year by Pew Internet Research -- of 700 and 935 teens, respectively -- 38 percent of respondents ages 12 to 14 said they had an online profile of some sort.
  •  
    Important article to read about children of all ages creating profiles. I believe this supports our driving need to incorporate instruction and discussion on this topic in schools.
Martin Burrett

All About Explorers - 1 views

  •  
    "This is an interesting history site about explorers… except it isn't. If you look at the information it is wildly wrong and the site is designed to teach about fact checking and to show children that not all information on the Internet is trustworthy."
Dave Truss

The Door That's Not Locked - Internet Safety - 7 views

  •  
    Parent & Teachers Sections with: -What's my kid doing? -What's normal? -Relationships? -What do I need to know? -What does my kid need to know?
Kelly Faulkner

Welcome to MyFootprint! What kind of mark are you leaving? - 15 views

  •  
    excellent website on digital footprints. the kids vlogs are touching.  haven't looked at the younger kid stuff, but will definitely be sharing the teen vlogs with my kids next term as we work on our own video responses.
Terry Elliott

World Without Walls: Learning Well with Others | Edutopia - 0 views

  • We must also expand our ability to think critically about the deluge of information now being produced by millions of amateur authors without traditional editors and researchers as gatekeepers. In fact, we need to rely on trusted members of our personal networks to help sift through the sea of stuff, locating and sharing with us the most relevant, interesting, useful bits. And we have to work together to organize it all, as long-held taxonomies of knowledge give way to a highly personalized information environment.
    • Jeff Richardson
       
      Good reason for teaching dig citizenship
    • Terry Elliott
       
      What Will suggests here is rising complexity, but for this to succeed we don't need to fight our genetic heritage. Put yourself on the Serengeti plains, a hunter-gatherer searching for food. You are thinking critically about a deluge of data coming through your senses (modern folk discount this idea, but any time in jobs that require observation in the 'wild' (farming comes to mind) will disabuse you rather quickly that the natural world is providing a clear channel.) You are not only relying upon your own 'amateur' abilities but those of your family and extended family to filter the noise of the world to get to the signal. This tribe is the original collaborative model and if we do not try to push too hard against this still controlling 'mean gene' then we will as a matter of course become a nation of collaborative learning tribes.
  • Collaboration in these times requires our students to be able to seek out and connect with learning partners, in the process perhaps navigating cultures, time zones, and technologies. It requires that they have a vetting process for those they come into contact with: Who is this person? What are her passions? What are her credentials? What can I learn from her?
    • Terry Elliott
       
      Aye, aye, captain. This is the classic problem of identity and authenticity. Can I trust this person on all the levels that are important for this particular collaboration? A hidden assumption here is that students have a passion themselves to learn something from these learning partners. What will be doing in this collaboration nation to value the ebb and flow of these learners' interests? How will we handle the idiosyncratic needs of the child who one moment wants to be J.K.Rowling and the next Madonna. Or both? What are the unintended consequences of creating an truly collaborative nation? Do we know? Would this be a 'worse' world for the corporations who seek our dollars and our workers? Probably. It might subvert the corporation while at the same moment create a new body of corporate cooperation. Isn't it pretty to think so.
  • Likewise, we must make sure that others can locate and vet us.
  • ...9 more annotations...
  • technical know-how is not enough. We must also be adept at negotiating, planning, and nurturing the conversation with others we may know little about -- not to mention maintaining a healthy balance between our face-to-face and virtual lives (another dance for which kids sorely need coaching).
    • Terry Elliott
       
      All of these skills are technical know how. We differentiate between hard and soft skills when we should be showing how they are all of a piece. I am so far from being an adequate coach on all of these matters it appalls me. I feel like the teacher who is one day ahead of his students and fears any question that skips ahead to chapters I have not read yet.
  • The Collaboration Age comes with challenges that often cause concern and fear. How do we manage our digital footprints, or our identities, in a world where we are a Google search away from both partners and predators? What are the ethics of co-creation when the nuances of copyright and intellectual property become grayer each day? When connecting and publishing are so easy, and so much of what we see is amateurish and inane, how do we ensure that what we create with others is of high quality?
    • Terry Elliott
       
      Partners and predators? OK, let's not in any way go down this road. This is the road our mainstream media has trod to our great disadvantage as citizens. These are not co-equal. Human brains are not naturally probablistic computer. We read about a single instance of internet predation and we equate it with all the instances of non-predation. We all have zero tolerance policies against guns in the school, yet our chances of being injured by those guns are fewer than a lightning strike. We cannot ever have this collaborative universe if we insist on a zero probability of predation. That is why, for good and ill, schools will never cross that frontier. It is in our genes. "Better safe than sorry" vs. "Risks may be our safeties in disguise."
  • Students are growing networks without us, writing Harry Potter narratives together at FanFiction.net, or trading skateboarding videos on YouTube. At school, we disconnect them not only from the technology but also from their passion and those who share it.
  • The complexities of editing information online cannot be sequestered and taught in a six-week unit. This has to be the way we do our work each day.
  • The process of collaboration begins with our willingness to share our work and our passions publicly -- a frontier that traditional schools have rarely crossed.
  • Look no further than Wikipedia to see the potential; say what you will of its veracity, no one can deny that it represents the incredible potential of working with others online for a common purpose.
  • The technologies we block in their classrooms flourish in their bedrooms
  • Anyone with a passion for something can connect to others with that same passion -- and begin to co-create and colearn the same way many of our students already do.
  • I believe that is what educators must do now. We must engage with these new technologies and their potential to expand our own understanding and methods in this vastly different landscape. We must know for ourselves how to create, grow, and navigate these collaborative spaces in safe, effective, and ethical ways. And we must be able to model those shifts for our students and counsel them effectively when they run across problems with these tools.
  •  
    Article by Wil Richardson on Collaboration
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
  • "A good password is the most important part of Internet security," said Robert Pacheco, the owner of Computer Techs of San Antonio. "It's the beginning and end of the issue. You can't stop it (hacking). You do what you can do to prevent it. You just try to stop most of it." A strong firewall, as well as spyware -- and virus-detection software -- protect a computer's so-called "back door," Pacheco said, where a hacker can gain access through various cyber threats. Those threats include infected e-mail attachments; phishing Web pages that exploit browser flaws; downloaded songs or pictures with hidden trojans; or plain ol' poking-and-prodding of a computer's shields. But passwords protect information from a frontal assault by way of the computer's keyboard.
  • ...7 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything. Get to know the person -- a technique that geeks refer to as "social engineering" -- and the password is easy to guess. There are message-board stalkers who can guess passwords in a half-dozen tries. Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password.
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Dean Mantz

Cyber, Are you still Bullying? - 0 views

  •  
    Memory game hosted by National Geographic. This game will test your short term memory.
« First ‹ Previous 41 - 60 of 80 Next ›
Showing 20 items per page