Skip to main content

Home/ educators/ Group items matching "preventing" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Vicki Davis

Faceless no more: Facebook admits errors | The Australian - 9 views

  • Staff reacted with shock and disbelief as they learned of the defacement of tribute pages set up to honour 12-year-old Elliott Fletcher and eight-year-old Trinity Bates.
  • Facebook stood accused of being faceless in Australia.
  • "Are people really doing that to a tribute page for a dead child? None of us as a group of people wants to see the product that we built used like that. It's awful."
  • ...4 more annotations...
  • If Facebook is subject to the traditional rules of publishing, then it is legally responsible for all the content that it hosts -- a commercially untenable position for a company of just 1000 employees for 400 million users globally.
  • But in fact, there was no security breach -- the people who defaced the Bates and Fletcher tribute sites had Facebook accounts and the tribute groups or pages were left open for anyone to join or comment.
  • but people who set up tribute sites do not have to wait for the website to remove objectionable material. When a person sets up either a group or fan page on Facebook, they can set controls about who is allowed to join or post content and what types of content -- such as comments, photographs or videos -- are permitted. The person running the tribute page can also delete any content they want without any need for a higher authority to intercede.
  • the problem was compounded by the fact the group founder quit and the page was left without an administrator.
  •  
    "Staff reacted with shock and disbelief as they learned of the defacement of tribute pages set up to honour 12-year-old Elliott Fletcher and eight-year-old Trinity Bates." This is an important article to discuss with students as the defacement of these pages happened because the group was set up for anyone to join and without moderation. Education Education prevents hurt and harm as happened in this case. Of course, it doesn't change the fact that Facebook, even though it is a global company, seems to have a centralized communications structure.
Vicki Davis

Net Neutrality FAQ: What's in it for You - PC World - 2 views

  •  
    Net neutrality is an important issue being addressed by the US government right now to prevent companies from sort of creating their own version of the Internet. These rules are supposed to keep things "open." I'm also sending these to my digiteen students (you can follow digiteen at http://www.twitter.com/digiteen) and Flat Classroom students (http://www.twitter.com/flatclassroom) for work on their project.
Vicki Davis

Seattle Public Schools | MS Cyberbullying Curriculum - 0 views

  •  
    Free middle school cyberbullying curriculum!
Fred Delventhal

Voxli: Group Voice Chat - 0 views

  •  
    Voxli Instant Voice Chat for Gamers and Teams Please get Adobe Flash Player to enable Voxli. If you already have Flash installed, some Flash-blocking or ad-blocking software could be preventing us from detecting Flash.
Jeff Johnson

Plagiarism - the definitive guide to prevention-Plagiarized.com - 0 views

  •  
    The purpose of this site is to help instructors and parents better understand how the internet can facilitate plagiarism. We present strategies to prevent plagiarism, explain some of the underlying causes, and provide advice on dealing with cases of confirmed plagiarism.
Jeff Johnson

Plagiarism Stoppers : A Teachers Guide - 0 views

  •  
    Links to information on plagiarism, how to detect it, how to stop it, how to educate about it.
Gary Bertoia

Teaching How to Learn | blog of proximal development - 0 views

  • his “context of public scrutiny” is of great importance here. The safety of the self-contained classroom, one separated (by walls and firewalls) from the rest of the world - the world we are supposed to prepare our students for - goes against everything that surrounds young people today and prevents them from learning how to navigate the complex online world.
  •  
    What, I kept asking myself, can educators learn from this report? More importantly, how can these lessons then be applied in our classrooms and teacher education programmes?
Dave Truss

Stumbling Blocks: Playing It Too Safe Will Make You Sorry | Edutopia - 0 views

  • "We need to create places where teachers can take chances," Honeycutt says. “Every district needs to anoint some teachers to play with Web 2.0 tools in a safe, hypothetical environment. I call it taming the tool. Teachers need time to consider, 'Under what conditions would we allow this tool into the classroom?'"
  • “We realized that students don't see these as impediments, but rather as challenges,” Canuel says. "Students find ingenious ways to go around them." Rather than fighting to stay a step ahead of tech-savvy pupils, the district emphasizes online safety and digital citizenship.
  • Instruction in digital citizenship needs to start early,
  • ...1 more annotation...
  • In the still-evolving Web 2.0 era, anyone with Internet access has the power to create and publish content online and interact with content others have created.
  •  
    Content filters and firewalls are great for keeping kids away from pornography, as required by the Children's Internet Protection Act, or preventing them from updating their Facebook status during class. But the same filters can stop teachers from accessing cutting-edge widgets and digital materials that have enormous potential for expanding learning.
Vicki Davis

NSF Scrub Club - 1 views

  •  
    Website that teaches proper handwashing for elementary children.
  •  
    For those of you who teach health and wellness at the elementary level, this is a really cool website -- the "Scrub Club" teaches proper handwashing techniques. You can use hand sanitizers all you want, but the best way to prevent disease is still good old soap and water.
Jeff Johnson

Texas Teachers To Carry Guns (CBSNews.com) - 0 views

  •  
    The Harrold, Texas school district calls for teachers to carry guns to prevent a future Columbine school incident. Harry Smith talks to the superintendent and a teacher's federation representative
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chosen password is your front-door lock - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
  • "A good password is the most important part of Internet security," said Robert Pacheco, the owner of Computer Techs of San Antonio. "It's the beginning and end of the issue. You can't stop it (hacking). You do what you can do to prevent it. You just try to stop most of it." A strong firewall, as well as spyware -- and virus-detection software -- protect a computer's so-called "back door," Pacheco said, where a hacker can gain access through various cyber threats. Those threats include infected e-mail attachments; phishing Web pages that exploit browser flaws; downloaded songs or pictures with hidden trojans; or plain ol' poking-and-prodding of a computer's shields. But passwords protect information from a frontal assault by way of the computer's keyboard.
  • ...7 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything. Get to know the person -- a technique that geeks refer to as "social engineering" -- and the password is easy to guess. There are message-board stalkers who can guess passwords in a half-dozen tries. Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password.
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Jeff Johnson

Here's How To Protect Your Kids From Cyberbullying - 0 views

  • The MindOH! Foundation is pleased to provide you with the following Cyberbullying Prevention Tips and Tools to help create peace of mind for you and the kids in your life. Families and schools can utilize these resources as discussion starters.
Marisa P

John Dewey: School and Society: Chapter 4: The Psychology of Elementary Education - 0 views

  • To refuse to try, to stick (97) blindly to tradition, because the search for the truth involves experimentation in the region of the unknown, is to refuse the only step which can introduce rational conviction into education.
    • Marisa P
       
      great quote
  • It should also be stated that practically it has not as yet been possible, in many cases, to act adequately upon the best ideas obtained, because of administrative difficulties, due to lack of funds —difficulties centering in the lack of a proper building and appliances, and in inability to pay the amounts necessary to secure the complete time of teachers in some important lines. Indeed, with the growth of the school in numbers, and in the age and maturity of pupils, it is becoming a grave question how long it is fair to the experiment to carry it on without more adequate facilities.
  • The aim, then, is not for the child to go to school as a place apart, but rather in the school so to recapitulate typical phases of his experience outside of school, as to enlarge, enrich, and gradually formulate it.
  • ...9 more annotations...
  • Since the aim is not "covering the ground," but knowledge of social processes used to secure social results, no attempt is made to go over the entire history, in chronological order, of America
  • His experiments are modes of active doing—almost as much so as his play and games. Later he tries to find out how various materials or agencies are manipulated in order to give certain results. It is thus clearly distinguished from experimentation in the scientific sense—such as is appropriate to the secondary period —where the aim is the discovery of facts and verification of principles.
  • means to ends
  • These subjects are social in a double sense. They represent the tools which society has evolved in the past as the instruments of its intellectual pursuits. They represent the keys which will unlock to the child the wealth of social capital which lies beyond the possible range of his limited individual experience. While these two points of view must always give these arts a highly important place in education, they also make it necessary that certain conditions should be observed in their introduction and use. In a wholesale and direct application of the studies no account is taken of these conditions. The chief problem at present relating to the three R's is recognition of these conditions and the adaptation of work to them.
  • 1) The need that the child shall have in his own personal (105) and vital experience a varied background of contact and acquaintance with realities, social and physical. This is necessary to prevent symbols from becoming a purely second-hand and conventional substitute for reality.
  • The need that the more ordinary, direct, and personal experience of the child shall furnish problems, motives, and interests that necessitate recourse to books for their solution, satisfaction, and pursuit. Otherwise, the child approaches the book without intellectual hunger, without alertness, without a questioning attitude, and the result is the one so deplorably common: such abject dependence upon books as weakens and cripples vigor of thought and inquiry, combined with reading for mere random stimulation of fancy, emotional indulgence, and flight from the world of reality into a make-belief land.
  • The final use of the symbols, whether in reading, calculation, or composition, is more intelligent, less mechanical; more active, less passively receptive; more an increase of power, less a mere mode of enjoyment.
  • third period of elementary education
  • the second period
Maureen Tumenas

Online Predators and Their Victims - 1 views

  • adult offenders who meet, develop relationships with, and openly seduce underage teenagers
    • Vicki Davis
       
      This is an important point to make to parents! It is about RELATIONSHIPS not abduction, usually!
  • The publicity about online"predators" who prey on naive children using trickery and violence is largely inaccurate.
  • In the great majority of cases, victims are aware they are conversing online with adults. In the N-JOV Study, only 5% of offenders pretended to be teens when they met potential victims online. (112)
    • David Donica
       
      There tends to be a focus on the negative - no matter what percentage of the actual story is being discussed. Our news from "normal" channels follows the old "if it bleeds it leeds" mentality. The potential of the web towards "good" is highly underated - in my humble oppion
  • ...23 more annotations...
  • Offenders rarely deceive victims about their sexual interests.
  • promises of love and romance
  • 99% of victims of Internet-initiated sex crimes in the N-JOV Study were 13 to 17 years old, and none were younger than 12. 48% were 13 or 14 years old. (115)
  • My (Liz B. Davis ) Summary of Key Points (All are quotes directly from the article): Online "Predators" and Their Victims. Myths, Realities, and Implications for Prevention and Treatment. by: Janis Wolak, David Finkelhor, and Kimberly J. Mitchell - University of New Hampshire and Michele L. Ybarra - Internet Solutions for Kids, Inc.
    • Vicki Davis
       
      Remember that we may start annotating articles and extracting this information together as well.
  • it was those 15-17 years of age who were most prone to take risks involving privacy and contact with unknown people. (115)
    • Vicki Davis
       
      This tells us what we need to know about courses on digital citizenship and safety -- discuss these issues probably beginning around 11 -- before soliciation happens -- then have focused programs probably starting age 12-13 -- as with everything -- these ages tend to get lower over time -- what will happen w/ the Webkinz generation is anyone's guess.
    • Kristin Hokanson
       
      I see this more and more...as the parent of webkinz kids...in the past..you had the "don't talk to strangers" talk with them. Now the strangers are coming into our homes and at much younger ages.
    • David Donica
       
      I think we need to be aware that not all "unknown people" are wanting to commit crimes, fraud, etc. Talking to someone you don't know might be the introduction to your new best friend. The content of discussion is important. Not knowing someone, I would not give them personal information. Friendship is built over time.
    • Michelle Krill
       
      A nice way I've heard to describe this is that even though kids think they're tech savvy, they are not relationship savvy. It's this age group that doesn't recognize the complexity of relationships.
    • Vicki Davis
       
      @David - I think, however, that we should be very careful about teaching HOW to make friendships -- friend of a friend and building relationships OVER TIME is often how these things happen. Children want the romance and don't realize the "gentle" stranger they've met wants to harm them. This is a tricky one -- one of my dearest friends is Julie Lindsay who I met online. But that conversation was totally OK, as youwould guess. Teaching them about this is tricky. We'll have to think on this one AND look at the research.
  • take place in isolation and secrecy, outside of oversight by peers, family  members, and others in the youth's face-to-face social networks (115)
    • Vicki Davis
       
      Again, this reinforces my thoughts of NOT having computers in the bedroom! Period. Have family computers w/ screens viewable by everyone!
  • Most of the online child molesters described in the N-JOV Study met their victims in chatrooms. In a 2006 study, about one third of youths who received online sexual solicitation had received them in chatrooms. (116)
    • Vicki Davis
       
      Safe IM practice -- that is a key element of an online safety program.
  • Youth internet users with histories of offline sexual or physical abuse appear to be considerably more likely to receive online aggressive sexual solicitations. (117)
    • Vicki Davis
       
      At risk teenagers are at risk online AND offline!
    • Kristin Hokanson
       
      But I think they are MORE at risk now that they have new outlets...THIS is what teachers / school faculty NEED to understand!
    • Vicki Davis
       
      Yes, Kristin! -- what we saw in Florida this week tells us that -- these students have now found a new way to have life in prison! And it relates to YOutube!
  • ..Although Internet safety advocates worry that posting personal information exposes youths to online molesters, we have not found empirical evidence that supports this concern. It is interactive behaviors, such as conversing online with unknown people about sex, that more clearly create risk. (117)
    • Vicki Davis
       
      Posting personal information is NOT what puts students at risk -- interactive BEHAVIORS! Do! This is one criticism we've had of online projects. At risk behaviors from AT RISK students cause things to happen!!! Listen up!
    • Kristin Hokanson
       
      and your students are lucky that they have you to guide them. Way too many schools are not involving their students in these activities so they don't have these "appropriate" models
    • Vicki Davis
       
      Exactly, kristin -- MORE SCHOOLS have got to do this. It is a travesty that these kids are being victimized when the schools can do something about it. Completely a travesty. I hope we can all get fired up again about this topic, especially with the good research coming out now!
  • Online molesters do not appear to be stalking unsuspecting victims but rather continuing to seek youths who are susceptible to seduction. (117)
  • maintaining online blogs or journals, which are similar to social networking sites in that they often include considerable amounts of personal information and pictures, is not related to receiving aggressive sexual solicitation unless youths also interact online with unknown people. (117)
    • Vicki Davis
       
      Safety habits and teaching students how to interact safely. Learning to interact with people you KNOW in safe ways will keep our students safe. It is NOT about pulling the plug.
  • Boys constitute 25% of victims in Internet-initiated sex crimes, and virtually all of their offenders are male. (118
    • Vicki Davis
       
      Unfortunately, teaching boys to beware of men is something we have to do because that seems to be who is preying on the young boys.
  • Some gay boys turn to the internet to find answers to questions about sexuality or meet potential romantic partners, and there they may encounter adults who exploit them. (118)
  • ..child molesters are, in reality, a diverse group that cannot be accurately characterized with one-dimensional labels. (118)
  • Online child molesters are generally not pedophiles. (118)Online child molesters are rarely violent. (119)
  • Child pornography production is also an aspect of Internet-initiated sex crimes. One in five online child molesters in the N-JOV Study took sexually suggestive or explicit photographs of victims or convinced victims to take such photographs of themselves or friends. (120)
    • Vicki Davis
       
      Again -- behaviors. Teaching children not to take pictures of themselves and post them w/out parental approval is important, particularly for younger kids.
  • Youths may be more willing to talk extensively and about more intimate matters with adults online than in face-to-face environments. (121
    • Vicki Davis
       
      "If you wouldn't say it face to face, you shouldn't say it anyplace," should be our new saying to our students. (Yes, I coined it but it iwhat I will teach to my children.)
  • it may not be clear to many adolescents and adults that relationships between adults and underage adolescents are criminal. (122)
  • Simply urging parents and guardians to control, watch, or educate their children may not be effective in many situations. The adolescents who tend to be the victims of Internet-initiated sex crimes many not themselves be very receptive to the advice and supervision of parents. (122)
    • Vicki Davis
       
      The fact that the victims don't have a great relationship with their parents mean that we must have other outlets for teenagers such as with teachers, counselors, and others who are involved in these discussions!
  • We recommend educating youths frankly about the dynamics of Internet-initiated and other nonforcible sex crimes. Youths need candid, direct discussions about seduction and how some adults deliberately evoke and then exploit the compelling feelings that sexual arousal can induce. (122)
    • Vicki Davis
       
      This recommendation is VERY important!
    • Vicki Davis
       
      Yes, this is a gross mischaracterization. We are afraid of the unknown scary boogeman who isn't who we think he is, when it is the person who is up front that we must worry about. We want someone to blame instead of realizing it is the behavior of kids.
  • Youths need candid, direct discussions about seduction
    • Diane Hammond
       
      The hard part is finding comfortable places to have these discussions. Where is the best place?
    • Vicki Davis
       
      I believe that the Http://digiteen.wikispaces.com project is the best thing I've got going in my classroom with 9th graders in Qatar & Austria. We're having great conversations -- third person looking at things happening and working through what they think is a good way to do it, I believe. I truly think that everyone working with students should be educated to watch for the "signs" -- and we should also have individual programs.
    • Maureen Tumenas
       
      Is this an accurate statistic?
    • Vicki Davis
       
      We can look back at the reference in this study -- the hyperlink is at the top of the page -- I'm not sure of the sample size for this but it looks like this is what the New Jersey study found.
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
  • ...3 more comments...
  •  
    Great article!
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
  •  
    Cool summary of an article by Liz B. Davis -- Liz took the article and extracted the most valuable bits to her using google Docs. This methodology is fascinating, but even moreso the fact we may all begin doing this together with Diigo.
Dave Truss

Wandering Ink - 0 views

  •  
    A great student blog for your feed reader. Kris is so insightful. Her 'How to Prevent another Da Vinci post was nominated in the edublogs as a 'most influential post'. She recently moved to her own server and lost a lot of readership.
  •  
    Coffee-addicted, wanderlust-afflicted, existential teen writer/debater seeks an intellectual escape and the complete works of Voltaire. Static characters and stilted dialogue need not apply. Ratpack fan a plus.
‹ Previous 21 - 37 of 37
Showing 20 items per page