Group items matching
in title, tags, annotations or urlFaceless no more: Facebook admits errors | The Australian - 9 views
-
Staff reacted with shock and disbelief as they learned of the defacement of tribute pages set up to honour 12-year-old Elliott Fletcher and eight-year-old Trinity Bates.
-
Facebook stood accused of being faceless in Australia.
-
"Are people really doing that to a tribute page for a dead child? None of us as a group of people wants to see the product that we built used like that. It's awful."
- ...4 more annotations...
-
"Staff reacted with shock and disbelief as they learned of the defacement of tribute pages set up to honour 12-year-old Elliott Fletcher and eight-year-old Trinity Bates." This is an important article to discuss with students as the defacement of these pages happened because the group was set up for anyone to join and without moderation. Education Education prevents hurt and harm as happened in this case. Of course, it doesn't change the fact that Facebook, even though it is a global company, seems to have a centralized communications structure.
Net Neutrality FAQ: What's in it for You - PC World - 2 views
-
Net neutrality is an important issue being addressed by the US government right now to prevent companies from sort of creating their own version of the Internet. These rules are supposed to keep things "open." I'm also sending these to my digiteen students (you can follow digiteen at http://www.twitter.com/digiteen) and Flat Classroom students (http://www.twitter.com/flatclassroom) for work on their project.
Voxli: Group Voice Chat - 0 views
Plagiarism Stoppers : A Teachers Guide - 0 views
Teaching How to Learn | blog of proximal development - 0 views
-
his “context of public scrutiny” is of great importance here. The safety of the self-contained classroom, one separated (by walls and firewalls) from the rest of the world - the world we are supposed to prepare our students for - goes against everything that surrounds young people today and prevents them from learning how to navigate the complex online world.
Stumbling Blocks: Playing It Too Safe Will Make You Sorry | Edutopia - 0 views
-
"We need to create places where teachers can take chances," Honeycutt says. “Every district needs to anoint some teachers to play with Web 2.0 tools in a safe, hypothetical environment. I call it taming the tool. Teachers need time to consider, 'Under what conditions would we allow this tool into the classroom?'"
-
“We realized that students don't see these as impediments, but rather as challenges,” Canuel says. "Students find ingenious ways to go around them." Rather than fighting to stay a step ahead of tech-savvy pupils, the district emphasizes online safety and digital citizenship.
-
Instruction in digital citizenship needs to start early,
- ...1 more annotation...
-
Content filters and firewalls are great for keeping kids away from pornography, as required by the Children's Internet Protection Act, or preventing them from updating their Facebook status during class. But the same filters can stop teachers from accessing cutting-edge widgets and digital materials that have enormous potential for expanding learning.
NSF Scrub Club - 1 views
-
Website that teaches proper handwashing for elementary children.
-
For those of you who teach health and wellness at the elementary level, this is a really cool website -- the "Scrub Club" teaches proper handwashing techniques. You can use hand sanitizers all you want, but the best way to prevent disease is still good old soap and water.
Play It Safe: Hackers use the back door to get into your computer; a strong, well-chosen password is your front-door lock - 0 views
-
For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
-
Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
-
"A good password is the most important part of Internet security," said Robert Pacheco, the owner of Computer Techs of San Antonio. "It's the beginning and end of the issue. You can't stop it (hacking). You do what you can do to prevent it. You just try to stop most of it." A strong firewall, as well as spyware -- and virus-detection software -- protect a computer's so-called "back door," Pacheco said, where a hacker can gain access through various cyber threats. Those threats include infected e-mail attachments; phishing Web pages that exploit browser flaws; downloaded songs or pictures with hidden trojans; or plain ol' poking-and-prodding of a computer's shields. But passwords protect information from a frontal assault by way of the computer's keyboard.
- ...7 more annotations...
-
Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Here's How To Protect Your Kids From Cyberbullying - 0 views
-
The MindOH! Foundation is pleased to provide you with the following Cyberbullying Prevention Tips and Tools to help create peace of mind for you and the kids in your life. Families and schools can utilize these resources as discussion starters.
John Dewey: School and Society: Chapter 4: The Psychology of Elementary Education - 0 views
-
To refuse to try, to stick (97) blindly to tradition, because the search for the truth involves experimentation in the region of the unknown, is to refuse the only step which can introduce rational conviction into education.
-
It should also be stated that practically it has not as yet been possible, in many cases, to act adequately upon the best ideas obtained, because of administrative difficulties, due to lack of funds —difficulties centering in the lack of a proper building and appliances, and in inability to pay the amounts necessary to secure the complete time of teachers in some important lines. Indeed, with the growth of the school in numbers, and in the age and maturity of pupils, it is becoming a grave question how long it is fair to the experiment to carry it on without more adequate facilities.
-
The aim, then, is not for the child to go to school as a place apart, but rather in the school so to recapitulate typical phases of his experience outside of school, as to enlarge, enrich, and gradually formulate it.
- ...9 more annotations...
Online Predators and Their Victims - 1 views
-
adult offenders who meet, develop relationships with, and openly seduce underage teenagers
-
The publicity about online"predators" who prey on naive children using trickery and violence is largely inaccurate.
-
In the great majority of cases, victims are aware they are conversing online with adults. In the N-JOV Study, only 5% of offenders pretended to be teens when they met potential victims online. (112)
- ...23 more annotations...
-
Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
- ...3 more comments...
-
Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
-
Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
Wandering Ink - 0 views
-
A great student blog for your feed reader. Kris is so insightful. Her 'How to Prevent another Da Vinci post was nominated in the edublogs as a 'most influential post'. She recently moved to her own server and lost a lot of readership.
-
Coffee-addicted, wanderlust-afflicted, existential teen writer/debater seeks an intellectual escape and the complete works of Voltaire. Static characters and stilted dialogue need not apply. Ratpack fan a plus.
‹ Previous
21 - 37 of 37
Showing 20▼ items per page