adult offenders who meet, develop relationships with, and openly seduce underage teenagers
1More
Google Code University - Google Code - 16 views
-
This website provides tutorials and sample course content so CS students and educators can learn more about current computing technologies and paradigms. In particular, this content is Creative Commons licensed which makes it easy for CS educators to use in their own classes. The Courses section contains tutorials, lecture slides, and problem sets for a variety of topic areas: AJAX Programming Algorithms Distributed Systems Web Security Languages In the Tools 101 section, you will find a set of introductions to some common tools used in Computer Science such as version control systems and databases.
1More
Wiki or Blog: Which is Better? - 9 views
www.teachscienceandmath.com/...wiki-or-blog-which-is-better
benefits blog advantages blogging comparison which one is best wiki web 20
shared by David Wetzel on 17 May 10
- Cached
-
Both wikis and blogs provide teachers with a a dynamic process for integrating Web 2.0 technology in their science and math classes. These two types of online tools offer students a more engaging process for learning. Both are relatively easy tools which do not require teachers or students to learn any special program tools or computer skills. Their uses and applications are only limited by the vision and purpose for helping students learn.
57More
Online Predators and Their Victims - 1 views
-
-
The publicity about online"predators" who prey on naive children using trickery and violence is largely inaccurate.
-
In the great majority of cases, victims are aware they are conversing online with adults. In the N-JOV Study, only 5% of offenders pretended to be teens when they met potential victims online. (112)
- ...23 more annotations...
-
99% of victims of Internet-initiated sex crimes in the N-JOV Study were 13 to 17 years old, and none were younger than 12. 48% were 13 or 14 years old. (115)
-
My (Liz B. Davis ) Summary of Key Points (All are quotes directly from the article): Online "Predators" and Their Victims. Myths, Realities, and Implications for Prevention and Treatment. by: Janis Wolak, David Finkelhor, and Kimberly J. Mitchell - University of New Hampshire and Michele L. Ybarra - Internet Solutions for Kids, Inc.
-
it was those 15-17 years of age who were most prone to take risks involving privacy and contact with unknown people. (115)
-
This tells us what we need to know about courses on digital citizenship and safety -- discuss these issues probably beginning around 11 -- before soliciation happens -- then have focused programs probably starting age 12-13 -- as with everything -- these ages tend to get lower over time -- what will happen w/ the Webkinz generation is anyone's guess.
-
I see this more and more...as the parent of webkinz kids...in the past..you had the "don't talk to strangers" talk with them. Now the strangers are coming into our homes and at much younger ages.
-
I think we need to be aware that not all "unknown people" are wanting to commit crimes, fraud, etc. Talking to someone you don't know might be the introduction to your new best friend. The content of discussion is important. Not knowing someone, I would not give them personal information. Friendship is built over time.
-
A nice way I've heard to describe this is that even though kids think they're tech savvy, they are not relationship savvy. It's this age group that doesn't recognize the complexity of relationships.
-
@David - I think, however, that we should be very careful about teaching HOW to make friendships -- friend of a friend and building relationships OVER TIME is often how these things happen. Children want the romance and don't realize the "gentle" stranger they've met wants to harm them. This is a tricky one -- one of my dearest friends is Julie Lindsay who I met online. But that conversation was totally OK, as youwould guess. Teaching them about this is tricky. We'll have to think on this one AND look at the research.
-
-
take place in isolation and secrecy, outside of oversight by peers, family members, and others in the youth's face-to-face social networks (115)
-
Most of the online child molesters described in the N-JOV Study met their victims in chatrooms. In a 2006 study, about one third of youths who received online sexual solicitation had received them in chatrooms. (116)
-
Youth internet users with histories of offline sexual or physical abuse appear to be considerably more likely to receive online aggressive sexual solicitations. (117)
-
..Although Internet safety advocates worry that posting personal information exposes youths to online molesters, we have not found empirical evidence that supports this concern. It is interactive behaviors, such as conversing online with unknown people about sex, that more clearly create risk. (117)
-
Posting personal information is NOT what puts students at risk -- interactive BEHAVIORS! Do! This is one criticism we've had of online projects. At risk behaviors from AT RISK students cause things to happen!!! Listen up!
-
and your students are lucky that they have you to guide them. Way too many schools are not involving their students in these activities so they don't have these "appropriate" models
-
Exactly, kristin -- MORE SCHOOLS have got to do this. It is a travesty that these kids are being victimized when the schools can do something about it. Completely a travesty. I hope we can all get fired up again about this topic, especially with the good research coming out now!
-
-
Online molesters do not appear to be stalking unsuspecting victims but rather continuing to seek youths who are susceptible to seduction. (117)
-
maintaining online blogs or journals, which are similar to social networking sites in that they often include considerable amounts of personal information and pictures, is not related to receiving aggressive sexual solicitation unless youths also interact online with unknown people. (117)
-
Boys constitute 25% of victims in Internet-initiated sex crimes, and virtually all of their offenders are male. (118
-
Some gay boys turn to the internet to find answers to questions about sexuality or meet potential romantic partners, and there they may encounter adults who exploit them. (118)
-
..child molesters are, in reality, a diverse group that cannot be accurately characterized with one-dimensional labels. (118)
-
Online child molesters are generally not pedophiles. (118)Online child molesters are rarely violent. (119)
-
Child pornography production is also an aspect of Internet-initiated sex crimes. One in five online child molesters in the N-JOV Study took sexually suggestive or explicit photographs of victims or convinced victims to take such photographs of themselves or friends. (120)
-
Youths may be more willing to talk extensively and about more intimate matters with adults online than in face-to-face environments. (121
-
it may not be clear to many adolescents and adults that relationships between adults and underage adolescents are criminal. (122)
-
Simply urging parents and guardians to control, watch, or educate their children may not be effective in many situations. The adolescents who tend to be the victims of Internet-initiated sex crimes many not themselves be very receptive to the advice and supervision of parents. (122)
-
We recommend educating youths frankly about the dynamics of Internet-initiated and other nonforcible sex crimes. Youths need candid, direct discussions about seduction and how some adults deliberately evoke and then exploit the compelling feelings that sexual arousal can induce. (122)
-
-
Youths need candid, direct discussions about seduction
-
The hard part is finding comfortable places to have these discussions. Where is the best place?
-
I believe that the Http://digiteen.wikispaces.com project is the best thing I've got going in my classroom with 9th graders in Qatar & Austria. We're having great conversations -- third person looking at things happening and working through what they think is a good way to do it, I believe. I truly think that everyone working with students should be educated to watch for the "signs" -- and we should also have individual programs.
-
-
-
Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
- ...3 more comments...
-
Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
-
Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
-
Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
-
Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
1More
UW-Stout ELearning and Online Teaching Certificate (Facebook Program Page) - 7 views
www.facebook.com/...128155160584057
graduate certificate e-learning E-Learning best practices E-learning for Educators e-learning jobs web2.0 learning teaching
shared by Dennis OConnor on 24 Apr 11
- No Cached
-
Here's our new program page on Facebook. I am updating this page regularly with information for anyone interested in e-learning and online teaching best practices. You don't have to be a current or former student to take advantage of the information and connections found here. I do ask you to 'Like' this page if you find it useful. (Try it! You'll Like It!)
1More
Lovely list of school resources, software, games and stuff! - 0 views
2More
Wolfram Demonstrations Project - 0 views
-
Offers interactive demonstrations of anything that can be modeled mathematically - bacteria growth, light refraction, supply and demand, etc. Running a demo requires Mathematica Player, which can be downloaded free, along with the demos
-
About the Wolfram Demonstrations Project Conceived by Mathematica creator and scientist Stephen Wolfram as a way to bring computational exploration to the widest possible audience, the Wolfram Demonstrations Project is an open-code resource that uses dynamic computation to illuminate concepts in science, technology, mathematics, art, finance, and a remarkable range of other fields. Its daily-growing collection of interactive illustrations is created by Mathematica users from around the world, who participate by contributing innovative Demonstrations. Interactive computational resources have typically been scattered across the web--requiring specialized programming knowledge that's made them difficult and expensive to develop. As a result, their coverage has long been limited, and progress has been slow. In many ways, the Wolfram Demonstrations Project introduces a new paradigm for exploring ideas. The power to easily create interactive visualizations, once in the domain of computing experts alone, is now in the hands of every Mathematica user. Demonstrations can be created with just a few short lines of readable code, powered by the revolutionary advances in Mathematica. This opens the door for researchers, educators, students, and professionals at any level to create their own sophisticated mini-applications and publish them online.
1More
StoryPlace - The Children's Digital Library - 1 views
www.storyplace.org/storyplace.asp
reading Literacy interactive library education resources storyplace languagearts k-6
shared by Ted Sakshaug on 20 Jul 09
- Cached
-
Children and their parents have for years enjoyed attending storytimes, checking out books and participating in a number of other educational, entertaining and participatory programs at the various locations of The Public Library of Charlotte Mecklenburg County. StoryPlace, an interactive web site, came about to provide children with the virtual experience of going to the library and participating in the same types of activities the library offers.
4More
Web-monitoring software gathers data on kid chats by AP: Yahoo! Tech - 0 views
-
Parents who install a leading brand of software to monitor their kids' online activities may be unwittingly allowing the company to read their children's chat messages — and sell the marketing data gathered.
-
Software sold under the Sentry and FamilySafe brands can read private chats conducted through Yahoo, MSN, AOL and other services, and send back data on what kids are saying about such things as movies, music or video games. The information is then offered to businesses seeking ways to tailor their marketing messages to kids.
-
a separate data-mining service called Pulse that taps into the data gathered by Sentry software to give businesses a glimpse of youth chatter online. While other services read publicly available teen chatter, Pulse also can read private chats. It gathers information from instant messages, blogs, social networking sites, forums and chat rooms.
- ...1 more annotation...
-
Parents who don't want the company to share their child's information to businesses can check a box to opt out. But that option can be found only by visiting the company's Web site, accessible through a control panel that appears after the program has been installed. It was not in the agreement contained in the Sentry Total Home Protection program The Associated Press downloaded and installed Friday.
11More
Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views
-
For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
-
Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
-
"A good password is the most important part of Internet security," said Robert Pacheco, the owner of Computer Techs of San Antonio. "It's the beginning and end of the issue. You can't stop it (hacking). You do what you can do to prevent it. You just try to stop most of it." A strong firewall, as well as spyware -- and virus-detection software -- protect a computer's so-called "back door," Pacheco said, where a hacker can gain access through various cyber threats. Those threats include infected e-mail attachments; phishing Web pages that exploit browser flaws; downloaded songs or pictures with hidden trojans; or plain ol' poking-and-prodding of a computer's shields. But passwords protect information from a frontal assault by way of the computer's keyboard.
- ...7 more annotations...
-
Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything. Get to know the person -- a technique that geeks refer to as "social engineering" -- and the password is easy to guess. There are message-board stalkers who can guess passwords in a half-dozen tries. Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password.
-
Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
-
The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
-
Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
-
Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
-
The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry.
-
The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
-
Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
2More
FireShot - Take screenshots of web pages with Firefox extension! - 0 views
1More
The Apple-Microsoft spat over App Store fees could shape the future of both Office and ... - 2 views
-
In a huge turn of irony, at least if one considers how Bill Gates began his programming career, a spat over Office 365 coming to the ipad and Apple's desire to get 30% commissions for anyone signing up for the service if it originates on the ipad, may mean that office 365 won't come to the ipad at all. The evolution of the platform to tablet devices is critical to software companies and yet, many balk at the steep cut some like Apple take. It is interesting to watch, but there is a bigger issue here. Microsoft continues to have the best Office suite, but, as with Google Drive, many move because of a lack of ubiquity and collaborative ability driven by the walls erected by Microsoft in their traditional, but understandable proprietary system. I have to think that there are bigger issues at stake for Microsoft here. These are interesting times, to say the least, as I sit here watching Batman on my Apple TV streaming via the wifi and read this article on my ipad as I blog in the den using a bluetooth logitech keyboard.
2More
Diigo Blog » Wear your "Diigo Education Pioneer" Badge with pride :-) - 0 views
-
If you want more "bling" for your blog -- Diigo has a new program to recognize educational pioneers using Diigo. Since the beginning, Maggie Tsai has listened to educators (not just me) in amazing ways and this is great. If you have a classroom diigo group, then log into your teacher console and snag your "diigo educational pioneer" badge - I'm going to get mine!! We use diigo groups for all of my classes and we have tag dictionaries based upon the major topics we cover.
2More
Estie's Gifts & Treasures: Thing #23 - Reflections - 1 views
estiesgifts.blogspot.com/...thing-23-reflections.html
23things best_practice education professionaldevelopment technology web 2.0
shared by Vicki Davis on 31 Jul 08
- Cached
-
This is precisely why more of us should be implementing the "23 things" pd program with our teachers. Estie Cuellar from Houston Texas did an amazing job discussing her learning journey and did an amazing job blogging it as well. This is very impressive and displays the transformational nature of becoming immersed in these tools. I look forward to seeing what happens in her classroom! Again, I believe that embedded PD (professional development that is in pieces as part of our day) rather than binge PD is much more transformational! This is proof!
-
summary of Estie Cullear's learning from the 23 things project -- an excellent professional development method for EMBEDDING PD.
1More
Students Live - Connecting Students to the 2010 Winter Games - 12 views
-
Students LIVE! is a program that invites twenty-four students from across Metro Vancouver and the Sea-to-Sky region to attend sport and cultural events during the Vancouver 2010 Olympic and Paralympic Winter Games and then share their experiences through social media tools. Twelve students will be selected for the Olympic Games and 12 will be selected for the Paralympic Games.
1More
5 Trends in Education Technology Leadership -- THE Journal - 11 views
thejournal.com/...ion-Technology-Leadership.aspx
technology education instruction web2.0 leadership professionaldevelopment
shared by Roland O'Daniel on 26 Apr 10
- Cached