Skip to main content

Home/ educators/ Group items tagged exploit

Rss Feed Group items tagged

Vicki Davis

YouTube - Broadcast Yourself. - 0 views

  • YouTube is not for pornography or sexually explicit content. If this describes your video, even if it's a video of yourself, don't post it on YouTube. Also, be advised that we work closely with law enforcement and we report child exploitation. Please read our Safety Tips and stay safe on YouTube. Don't post videos showing bad stuff like animal abuse, drug abuse, under-age drinking and smoking, or bomb making. Graphic or gratuitous violence is not allowed. If your video shows someone being physically hurt, attacked, or humiliated, don't post it. YouTube is not a shock site. Don't post gross-out videos of accidents, dead bodies or similar things intended to shock or disgust.
  • Only upload videos that you made or that you are authorized to use.
  • revealing other people’s personal information,
  •  
    Many people have not read the Youtube Community Guidelines. You should report any videos that break these rules to youtube - everyone should have a youtube account and be able to do this. Today, a student had a bad video linked to hers -- I had to go to another place to report the other video but you can do this! Guidelines: "Don't Cross the Line Here are some common-sense rules that will help you steer clear of trouble: * YouTube is not for pornography or sexually explicit content. If this describes your video, even if it's a video of yourself, don't post it on YouTube. Also, be advised that we work closely with law enforcement and we report child exploitation. Please read our Safety Tips and stay safe on YouTube. * Don't post videos showing bad stuff like animal abuse, drug abuse, under-age drinking and smoking, or bomb making. * Graphic or gratuitous violence is not allowed. If your video shows someone being physically hurt, attacked, or humiliated, don't post it. * YouTube is not a shock site. Don't post gross-out videos of accidents, dead bodies or similar things intended to shock or disgust. * Respect copyright. Only upload videos that you made or that you are authorized to use. This means don't upload videos you didn't make, or use content in your videos that someone else owns the copyright to, such as music tracks, snippets of copyrighted programs, or videos made by other users, without necessary authorizations. Read our Copyright Tips for more information. * We encourage free speech and defend everyone's right to express unpopular points of view. But we don't permit hate speech (speech which attacks or demeans a group based on race or ethnic origin, religion, disability, gender, age, veteran status, and sexual orientation/gender identity). * Things like predatory behavior, stalking, threats, harassment, intimidation, invading privacy, revealing other people's personal information, and inciting others to commit violent act
David Wetzel

How to Use Twitter to Stay Informed in Science and Math - 7 views

  •  
    The value of Twitter for helping you and your colleagues stay informed of the latest trends, ideas, resources, and Web 2.0 integration tools has increased tremendously in the past year. A Web 2.0 tool is available for exploiting the every growing information on Twitter to remove barriers and allow you to collaborate with other science and math teachers. This new online tool is paper.li - a source of daily Twitter newsletters in education.
Maureen Tumenas

Online Predators and Their Victims - 1 views

  • adult offenders who meet, develop relationships with, and openly seduce underage teenagers
    • Vicki Davis
       
      This is an important point to make to parents! It is about RELATIONSHIPS not abduction, usually!
  • The publicity about online"predators" who prey on naive children using trickery and violence is largely inaccurate.
  • In the great majority of cases, victims are aware they are conversing online with adults. In the N-JOV Study, only 5% of offenders pretended to be teens when they met potential victims online. (112)
    • David Donica
       
      There tends to be a focus on the negative - no matter what percentage of the actual story is being discussed. Our news from "normal" channels follows the old "if it bleeds it leeds" mentality. The potential of the web towards "good" is highly underated - in my humble oppion
  • ...23 more annotations...
  • Offenders rarely deceive victims about their sexual interests.
  • promises of love and romance
  • 99% of victims of Internet-initiated sex crimes in the N-JOV Study were 13 to 17 years old, and none were younger than 12. 48% were 13 or 14 years old. (115)
  • My (Liz B. Davis ) Summary of Key Points (All are quotes directly from the article): Online "Predators" and Their Victims. Myths, Realities, and Implications for Prevention and Treatment. by: Janis Wolak, David Finkelhor, and Kimberly J. Mitchell - University of New Hampshire and Michele L. Ybarra - Internet Solutions for Kids, Inc.
    • Vicki Davis
       
      Remember that we may start annotating articles and extracting this information together as well.
  • it was those 15-17 years of age who were most prone to take risks involving privacy and contact with unknown people. (115)
    • Vicki Davis
       
      This tells us what we need to know about courses on digital citizenship and safety -- discuss these issues probably beginning around 11 -- before soliciation happens -- then have focused programs probably starting age 12-13 -- as with everything -- these ages tend to get lower over time -- what will happen w/ the Webkinz generation is anyone's guess.
    • Kristin Hokanson
       
      I see this more and more...as the parent of webkinz kids...in the past..you had the "don't talk to strangers" talk with them. Now the strangers are coming into our homes and at much younger ages.
    • David Donica
       
      I think we need to be aware that not all "unknown people" are wanting to commit crimes, fraud, etc. Talking to someone you don't know might be the introduction to your new best friend. The content of discussion is important. Not knowing someone, I would not give them personal information. Friendship is built over time.
    • Michelle Krill
       
      A nice way I've heard to describe this is that even though kids think they're tech savvy, they are not relationship savvy. It's this age group that doesn't recognize the complexity of relationships.
    • Vicki Davis
       
      @David - I think, however, that we should be very careful about teaching HOW to make friendships -- friend of a friend and building relationships OVER TIME is often how these things happen. Children want the romance and don't realize the "gentle" stranger they've met wants to harm them. This is a tricky one -- one of my dearest friends is Julie Lindsay who I met online. But that conversation was totally OK, as youwould guess. Teaching them about this is tricky. We'll have to think on this one AND look at the research.
  • take place in isolation and secrecy, outside of oversight by peers, family  members, and others in the youth's face-to-face social networks (115)
    • Vicki Davis
       
      Again, this reinforces my thoughts of NOT having computers in the bedroom! Period. Have family computers w/ screens viewable by everyone!
  • Most of the online child molesters described in the N-JOV Study met their victims in chatrooms. In a 2006 study, about one third of youths who received online sexual solicitation had received them in chatrooms. (116)
    • Vicki Davis
       
      Safe IM practice -- that is a key element of an online safety program.
  • Youth internet users with histories of offline sexual or physical abuse appear to be considerably more likely to receive online aggressive sexual solicitations. (117)
    • Vicki Davis
       
      At risk teenagers are at risk online AND offline!
    • Kristin Hokanson
       
      But I think they are MORE at risk now that they have new outlets...THIS is what teachers / school faculty NEED to understand!
    • Vicki Davis
       
      Yes, Kristin! -- what we saw in Florida this week tells us that -- these students have now found a new way to have life in prison! And it relates to YOutube!
  • ..Although Internet safety advocates worry that posting personal information exposes youths to online molesters, we have not found empirical evidence that supports this concern. It is interactive behaviors, such as conversing online with unknown people about sex, that more clearly create risk. (117)
    • Vicki Davis
       
      Posting personal information is NOT what puts students at risk -- interactive BEHAVIORS! Do! This is one criticism we've had of online projects. At risk behaviors from AT RISK students cause things to happen!!! Listen up!
    • Kristin Hokanson
       
      and your students are lucky that they have you to guide them. Way too many schools are not involving their students in these activities so they don't have these "appropriate" models
    • Vicki Davis
       
      Exactly, kristin -- MORE SCHOOLS have got to do this. It is a travesty that these kids are being victimized when the schools can do something about it. Completely a travesty. I hope we can all get fired up again about this topic, especially with the good research coming out now!
  • Online molesters do not appear to be stalking unsuspecting victims but rather continuing to seek youths who are susceptible to seduction. (117)
  • maintaining online blogs or journals, which are similar to social networking sites in that they often include considerable amounts of personal information and pictures, is not related to receiving aggressive sexual solicitation unless youths also interact online with unknown people. (117)
    • Vicki Davis
       
      Safety habits and teaching students how to interact safely. Learning to interact with people you KNOW in safe ways will keep our students safe. It is NOT about pulling the plug.
  • Boys constitute 25% of victims in Internet-initiated sex crimes, and virtually all of their offenders are male. (118
    • Vicki Davis
       
      Unfortunately, teaching boys to beware of men is something we have to do because that seems to be who is preying on the young boys.
  • Some gay boys turn to the internet to find answers to questions about sexuality or meet potential romantic partners, and there they may encounter adults who exploit them. (118)
  • ..child molesters are, in reality, a diverse group that cannot be accurately characterized with one-dimensional labels. (118)
  • Online child molesters are generally not pedophiles. (118)Online child molesters are rarely violent. (119)
  • Child pornography production is also an aspect of Internet-initiated sex crimes. One in five online child molesters in the N-JOV Study took sexually suggestive or explicit photographs of victims or convinced victims to take such photographs of themselves or friends. (120)
    • Vicki Davis
       
      Again -- behaviors. Teaching children not to take pictures of themselves and post them w/out parental approval is important, particularly for younger kids.
  • Youths may be more willing to talk extensively and about more intimate matters with adults online than in face-to-face environments. (121
    • Vicki Davis
       
      "If you wouldn't say it face to face, you shouldn't say it anyplace," should be our new saying to our students. (Yes, I coined it but it iwhat I will teach to my children.)
  • it may not be clear to many adolescents and adults that relationships between adults and underage adolescents are criminal. (122)
  • Simply urging parents and guardians to control, watch, or educate their children may not be effective in many situations. The adolescents who tend to be the victims of Internet-initiated sex crimes many not themselves be very receptive to the advice and supervision of parents. (122)
    • Vicki Davis
       
      The fact that the victims don't have a great relationship with their parents mean that we must have other outlets for teenagers such as with teachers, counselors, and others who are involved in these discussions!
  • We recommend educating youths frankly about the dynamics of Internet-initiated and other nonforcible sex crimes. Youths need candid, direct discussions about seduction and how some adults deliberately evoke and then exploit the compelling feelings that sexual arousal can induce. (122)
    • Vicki Davis
       
      This recommendation is VERY important!
    • Vicki Davis
       
      Yes, this is a gross mischaracterization. We are afraid of the unknown scary boogeman who isn't who we think he is, when it is the person who is up front that we must worry about. We want someone to blame instead of realizing it is the behavior of kids.
  • Youths need candid, direct discussions about seduction
    • Diane Hammond
       
      The hard part is finding comfortable places to have these discussions. Where is the best place?
    • Vicki Davis
       
      I believe that the Http://digiteen.wikispaces.com project is the best thing I've got going in my classroom with 9th graders in Qatar & Austria. We're having great conversations -- third person looking at things happening and working through what they think is a good way to do it, I believe. I truly think that everyone working with students should be educated to watch for the "signs" -- and we should also have individual programs.
    • Maureen Tumenas
       
      Is this an accurate statistic?
    • Vicki Davis
       
      We can look back at the reference in this study -- the hyperlink is at the top of the page -- I'm not sure of the sample size for this but it looks like this is what the New Jersey study found.
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
  • ...3 more comments...
  •  
    Great article!
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
Adrienne Michetti

AJET 19(1) Boyle (2003) - design principles for authoring dynamic, reusable learning ob... - 1 views

  • delineate a coherent framework for the authoring of re-purposable learning objects
  • significant changes in the creation of learning objects
  • nternational work directed at developing learning object standards
  • ...33 more annotations...
  • a learning object is defined as any entity, digital or non-digital, that may be used for learning, education or training. IEEE
  • ork on metadata and learning object packaging
  • cohesion
  • ke any learning object and provide a 'wrapper' around this object
  • learning object is thus 'packaged' in a standard container format
  • learning objects must be developed with potential reuse, and especially repurposing in mind. The principal aim of this paper is to explore and delineate principles underlying authoring for reuse and repurposing.
  • taxonomy
  • This mapping suggests that each learning object should be based on one learning objective or clear learning goal.
  • The principle of cohesion, however, indicates that there should be a separate learning object for each type of loop. An immediate advantage is that the tutor can select the order in which these learning objects are combined. A tutor dealing with experienced student may wish to deal with these in sequence; another tutor with a different group of students may intersperse these learning objects with object dealing with other features of the language.
    • Adrienne Michetti
       
      This would, then, make them easier to edit and manipulate in the future. I can follow this article.
  • the principle of 'de-coupling', or more accurately minimised coupling.
  • unit (software module/learning object) should have minimal bindings to other units.
  • independently of the other (
    • Adrienne Michetti
       
      Right - and the goal is complete independence so as to be able to manipulate and change later.
  • The learning object should, as far as possible, be free standing.
    • Adrienne Michetti
       
      YES! Can we please apply this to items as simple as Word documents and HTML? It would make things so much easier. This also reminds me of good pedagogical design principles BEFORE we had digital learning -- the same should be true for worksheets, handouts, textbooks, etc. It needs to be able to be changed.
  • adaptation
  • The challenge is to maintain this richness in a system composed of reusable components.
  • We must face the challenge of creating learning objects that are cohesive, decoupled and pedagogically rich. This design challenge is associated with the issue of 'repurposability' as we might expect rich learning objects to provide further options for adaptation by local tutors.
    • Adrienne Michetti
       
      Yes, yes, and yes. We need to think beyond our own immediate purposes.
  • n the Java language
    • Adrienne Michetti
       
      quite honestly, I would have preferred a non-computer programming example. These principles apply to all technology design, not just programming. Something more accessible would have made this paper stronger.
  • The project involves intervention in syllabus development, the social organisation of learning and the introduction of new eLearning materials. The eLearning resources are being based on the authoring of rich, reusable learning objects. This development provides the focus for the present discussion.
  • The learning objects are being developed both to meet immediate pedagogical needs and to serve this larger goal. This produces extra pressure initially. However, it provides the potential to divide the eventual task among a number of contributing partners, exploiting considerable advantages of scale.
  • A key challenge for the project is to resolve the tensions in a creative and productive way.
    • Adrienne Michetti
       
      Basically, you have to take it all apart and put it back together again. This is fundamental to learning a new way to design anything, really.
  • A compound object consists of two or more independent learning objects that are linked to create the compound.
  • A further important feature is that each simple component object can be reused independently.
  • They thus provide a basis for pedagogical richness that fully exploits the opportunities offered by the technology.
    • Adrienne Michetti
       
      YES! use the tech to its best.
  • manage the bindings between one object and others
  • they should be able to reconfigure this to shape their own compound object.
    • Adrienne Michetti
       
      This is so crucial. Each educator must be able to restructure it, use to his/her advantage within context.
  • main types of binding: navigational bindings through URLs and non-URL based content bindings. This design pattern deals with the issue of URL based bindings.
  • we must have a design mechanism for managing these bindings.
  • learning object consists of a core and zero or more expansions. A default object is presented with the core with certain expansions added. These expansions aim to provide added pedagogical value to help in attaining the learning objective.
  • the relationship between learning objects and the syllabus, course or other higher organising structure in which they are delivered.
  • the syllabus navigation structure operates at a different layer of organisation for the learning object resources
  • . These syllabi objects operate at a different layer from that of main content objects
  • The key message is the need to establish distinct layers of organisation in eLearning
  • The central challenge is to design for reuse and repurposing.
  •  
    painful reading with the example of Java - but the point remains that all learning objects should be managed and designed with the purpose of being able to use them in the future in ways that are dynamic and reusable. This means de-coupling them and ensuring they are made of distinct pedagogical units.
Martin Burrett

Barnardo's launches free LGBTQ teaching resources - 2 views

  •  
    "Barnardo's has launched free lesbian, gay, bisexual, transgender and questioning (LGBTQ) resources to help teachers better educate children about same sex relationships and gender and sexual identities. The free LGBTQ resources aimed at primary and secondary schools have been launched by children's charity Barnardo's to sit alongside their existing Real Love Rocks resources, which teach children and young people about healthy relationships and awareness of child sexual exploitation."
Tony Richards

The Atlantic Online | January/February 2010 | What Makes a Great Teacher? | Amanda Ripley - 14 views

  •  
    "What Makes a Great Teacher? Image credit: Veronika Lukasova Also in our Special Report: National: "How America Can Rise Again" Is the nation in terminal decline? Not necessarily. But securing the future will require fixing a system that has become a joke. Video: "One Nation, On Edge" James Fallows talks to Atlantic editor James Bennet about a uniquely American tradition-cycles of despair followed by triumphant rebirths. Interactive Graphic: "The State of the Union Is ..." ... thrifty, overextended, admired, twitchy, filthy, and clean: the nation in numbers. By Rachael Brown Chart: "The Happiness Index" Times were tough in 2009. But according to a cool Facebook app, people were happier. By Justin Miller On August 25, 2008, two little boys walked into public elementary schools in Southeast Washington, D.C. Both boys were African American fifth-graders. The previous spring, both had tested below grade level in math. One walked into Kimball Elementary School and climbed the stairs to Mr. William Taylor's math classroom, a tidy, powder-blue space in which neither the clocks nor most of the electrical outlets worked. The other walked into a very similar classroom a mile away at Plummer Elementary School. In both schools, more than 80 percent of the children received free or reduced-price lunches. At night, all the children went home to the same urban ecosystem, a zip code in which almost a quarter of the families lived below the poverty line and a police district in which somebody was murdered every week or so. Video: Four teachers in Four different classrooms demonstrate methods that work (Courtesy of Teach for America's video archive, available in February at teachingasleadership.org) At the end of the school year, both little boys took the same standardized test given at all D.C. public schools-not a perfect test of their learning, to be sure, but a relatively objective one (and, it's worth noting, not a very hard one). After a year in Mr. Taylo
Carl Bogardu

Scan Websites for Exploits, Malware and other Malicious Threats - URLVoid.com BETA - 7 views

  •  
    If one is constantly searching for new education websites, as I am, this is a handy tool to use before opening that site.
Dave Truss

mental_floss Blog » 5 People Who Exploited the Web to Get Hired - 8 views

  •  
    cool people who used the Web to their advantage in unusual ways.
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
  • "A good password is the most important part of Internet security," said Robert Pacheco, the owner of Computer Techs of San Antonio. "It's the beginning and end of the issue. You can't stop it (hacking). You do what you can do to prevent it. You just try to stop most of it." A strong firewall, as well as spyware -- and virus-detection software -- protect a computer's so-called "back door," Pacheco said, where a hacker can gain access through various cyber threats. Those threats include infected e-mail attachments; phishing Web pages that exploit browser flaws; downloaded songs or pictures with hidden trojans; or plain ol' poking-and-prodding of a computer's shields. But passwords protect information from a frontal assault by way of the computer's keyboard.
  • ...7 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything. Get to know the person -- a technique that geeks refer to as "social engineering" -- and the password is easy to guess. There are message-board stalkers who can guess passwords in a half-dozen tries. Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password.
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Vicki Davis

Libraries Shun Deals to Place Books on Web - New York Times - 0 views

  • Open Content Alliance
  • , a nonprofit effort aimed at making their materials broadly available.
  • Libraries that agree to work with Google must agree to a set of terms, which include making the material unavailable to other commercial search services. Microsoft places a similar restriction on the books it converts to electronic form. The Open Content Alliance, by contrast, is making the material available to any search service.
  • ...5 more annotations...
  • Many prominent libraries have accepted Google’s offer — including the New York Public Library and libraries at the University of Michigan, Harvard, Stanford and Oxford. Google expects to scan 15 million books from those collections over the next decade.
  • many in the academic and nonprofit world are intent on pursuing a vision of the Web as a global repository of knowledge that is free of business interests or restrictions.
  • libraries and researchers worry that if any one company comes to dominate the digital conversion of these works, it could exploit that dominance for commercial gain.
  • “One is shaped by commercial concerns, the other by a commitment to openness, and which one will win is not clear.”
  • The Open Content Alliance is the brainchild of Brewster Kahle, the founder and director of the Internet Archive, which was created in 1996 with the aim of preserving copies of Web sites and other material.
  •  
    This New York Times article on the Open Content Alliance is an essential article for librarians and media specialists to read. It is also important for those following the fight for information and control of that information. In this case, the Open Content Alliance wants to make books that they scan available to any search engine while Microsoft and google are aggressively approaching libraries for exclusive access to their content. (which could be rescanned by another later, possibly.) Librarians and media specialists should understand this... when will people approach schools to scan annuals or student produced works? Maybe that is a while off, but for now, be aware that it is probably inevitable.
  •  
    An overview of the Open Content Alliance versus Google and Microsoft battling to take control of the content housed in libraries.
Ruth Howard

High Scalability - High Scalability - The Amazing Collective Compute Power of... - 4 views

  • Earlier we talked about how a single botnet could harness more compute power than our largest super computers. Well, that's just the start of it. The amount of computer power available to the Ambient Cloud will be truly astounding.
  • By 2014 one estimate is there will be 2 billion PCs. That's a giant reservoir of power to exploit, especially considering these new boxes are stuffed with multiple powerful processors and gigabytes of memory. 7 Billion Smartphones By now it's common wisdom smartphones are the computing platform of the future. It's plausible to assume the total number of mobile phones in use will roughly equal the number of people on earth. That's 7 billion smartphones. Smartphones aren't just tiny little wannabe computers anymore either. They are real computers and are getting more capable all the time.
  • One Google exec estimates that in 12 years an iPod will be able to store all the video ever produced.
  • ...8 more annotations...
  • But all the compute power in the world is of little use if the cores can't talk to each other.
  • Inductive chargers will also make it easier to continually charge devices. Nokia is working on wireless charging. And devices will start harvesting energy from the surroundings. So it looks like the revolution will be fully powered.
  • . Literally billions of dollars are being invested into developing a giant sensor grids to manage power. Other grids will be set up for water, climate, pollution, terrorist attacks, traffic, and virtually everything else you can think to measure and control.
  • . Others predict the smart grid could be 1,000 times larger than the Internet.
  • Clearly this technology has obvious health and medical uses, and it may also figure into consumer and personal entertainment.
  • What if instead smartphones become the cloud?
  • In the future compute capacity will be everywhere. This is one of the amazing gifts of computer technology and also why virtualization has become such a hot datacenter trend.
  • It's out of that collective capacity that an Ambient Cloud can be formed, like a galaxy is formed from interstellar dust. We need to find a more systematic way of putting it to good use.
  •  
    digital citizenship headed for the clouds...
EXECUTIVE DIRECTOR

"When Your Privates Go Public" - 14 views

  •  
    Taking the pictures, sending the pictures, or keeping the pictures of underage teens can land you in deep water. So what do you do? How do you learn more?
Caroline Bucky-Beaver

Code of Best Practices in Fair Use for Media Literacy Education - 1 views

  • Fair use is the right to use copyrighted material without permission or payment under some circumstances -- especially when the cultural or social benefits of the use are predominant. It is a general right that applies even in situations where the law provides no specific authorization for the use in question -- as it does for certain narrowly defined classroom activities.
  • guide identifies five principles that represent the media literacy education community’s current consensus about acceptable practices for the fair use of copyrighted materials
  • code of best practices does not tell you the limits of fair use rights. Instead, it describes how those rights should apply in certain recurrent situations.
  • ...30 more annotations...
  • Media literacy education distinctively features the analytical attitude that teachers and learners, working together, adopt toward the media objects they study. The foundation of effective media analysis is the recognition that: All media messages are constructed.Each medium has different characteristics and strengths and a unique language of construction.Media messages are produced for particular purposes.All media messages contain embedded values and points of view.People use their individual skills, beliefs and experiences to construct their own meanings from media messages.Media and media messages can influence beliefs, attitudes, values, behaviors, and the democratic process. Making media and sharing it with listeners, readers, and viewers is essential to the development of critical thinking and communication skills. Feedback deepens reflection on one’s own editorial and creative choices and helps students grasp the power of communication.
  • Lack of clarity reduces learning and limits the ability to use digital tools. Some educators close their classroom doors and hide what they fear is infringement; others hyper-comply with imagined rules that are far stricter than the law requires, limiting the effectiveness of their teaching and their students’ learning.
  • Educators and learners in media literacy often make uses of copyrighted materials that stand far outside the marketplace, for instance, in the classroom, at a conference, or within a school-wide or district-wide festival. Such uses, especially when they occur within a restricted-access network, do enjoy certain copyright advantages.
  • Law provides copyright protection to creative works in order to foster the creation of culture. Its best known feature is protection of owners’ rights. But copying, quoting, and generally re-using existing cultural material can be, under some circumstances, a critically important part of generating new culture.
  • In reviewing the history of fair use litigation, we find that judges return again and again to two key questions: Did the unlicensed use "transform" the material taken from the copyrighted work by using it for a different purpose than that of the original, or did it just repeat the work for the same intent and value as the original? Was the material taken appropriate in kind and amount, considering the nature of the copyrighted work and of the use? If the answers to these two questions are "yes," a court is likely to find a use fair. Because that is true, such a use is unlikely to be challenged in the first place.
  • Both key questions touch on, among other things, the question of whether the use will cause excessive economic harm to the copyright owner. Courts have told us that copyright owners aren’t entitled to an absolute monopoly over transformative uses of their works.
  • Another consideration underlies and influences the way in which these questions are analyzed: whether the user acted reasonably and in good faith, in light of general practice in his or her particular field.
  • Code of Best Practices in Fair Use for Media Literacy Education
  • Through its five principles, this code of best practices identifies five sets of current practices in the use of copyrighted materials in media literacy education to which the doctrine of fair use clearly applies. These practices are associated with K–12 education, higher education, and in classes given by nonprofit organizations. When students or educators use copyrighted materials in their own creative work outside of an educational context, they can rely on fair use guidelines created by other creator groups, including documentary filmmakers and online video producers.
  • These principles apply to all forms of media.
  • The principles apply in institutional settings and to non-school-based programs. 
  • The principles concern the unlicensed fair use of copyrighted materials for education, not the way those materials were acquired. 
  • where a use is fair, it is irrelevant whether the source of the content in question was a recorded over-the-air broadcast, a teacher’s personal copy of a newspaper or a DVD, or a rented or borrowed piece of media. Labels on commercial media products proclaiming that they are “licensed for home [or private or educational or noncommercial] use only” do not affect in any way the educator’s ability to make fair use of the contents—in fact, such legends have no legal effect whatsoever. (If a teacher is using materials subject to a license agreement negotiated by the school or school system, however, she may bebound by the terms of that license.)
  • The principles are all subject to a “rule of proportionality.” 
  • fairness of a use depends, in part, on whether the user tookmore than was needed to accomplish his or her legitimate purpose.
  • PRINCIPLES
  • ONE:  Employing Copyrighted Material in Media Literacy Lessons
  • TWO:  Employing Copyrighted Materials in Preparing Curriculum Materials
  • THREE:  Sharing Media Literacy Curriculum Materials
  • In materials they wish to share, curriculum developers should beespecially careful to choose illustrations from copyrighted media that are necessaryto meet the educational objectives of the lesson, using only what furthers theeducational goal or purpose for which it is being made.
  • FOUR:  Student Use of Copyrighted Materials in Their Own Academic and Creative Work
  • Students should be able to understand and demonstrate, in a mannerappropriate to their developmental level, how their use of a copyrighted workrepurposes or transforms the original. For example, students may use copyrightedmusic for a variety of purposes, but cannot rely on fair use when their goal is simplyto establish a mood or convey an emotional tone, or when they employ popular songssimply to exploit their appeal and popularity.
  • FIVE:  Developing Audiences for Student Work
  • If student work that incorporates, modifies, and re-presents existingmedia content meets the transformativeness standard, it can be distributed to wideaudiences under the doctrine of fair use.
  • Educators and learners in media literacy often make uses of copyrighted works outside the marketplace, for instance in the classroom, a conference, or within a school-wide or district-wide festival. When sharing is confined to a delimited network, such uses are more likely to receive special consideration under the fair use doctrine.
  • Especially in situations where students wish to share their work more broadly (by distributing it to the public, for example, or including it as part of a personal portfolio), educators should take the opportunity to model the real-world permissions process, with explicit emphasis not only on how that process works, but also on how it affects media making.
  • The ethical obligation to provide proper attribution also should be examined.
  • This code of best practices, by contrast, is shaped by educators for educators and the learners they serve, with the help of legal advisors. As an important first step in reclaiming their fair use rights, educators should employ this document to inform their own practices in the classroom and beyond
  • MYTH:  Fair Use Is Just for Critiques, Commentaries, or Parodies. Truth:  Transformativeness, a key value in fair use law, can involve modifying material or putting material in a new context, or both. Fair use applies to a wide variety of purposes, not just critical ones. Using an appropriate excerpt from copyrighted material to illustrate a key idea in the course of teaching is likely to be a fair use, for example. Indeed, the Copyright Act itself makes it clear that educational uses will often be considered fair because they add important pedagogical value to referenced media objects.
  • So if work is going to be shared widely, it is good to be able to rely on transformativeness. As the cases show, a transformative new work can be highly commercial in intent and effect and qualify under the fair use doctrine.
  •  
    Great article outlining copyright, fair use and explaning the 5 principles of fair use in education.
1 - 13 of 13
Showing 20 items per page