background preloader

Real-Life Stories

Real-Life Stories

GetNetWise | You're one click away test2.html what is it? :: how it works :: why cyberbully? :: prevention :: take action :: what's the law? What is cyberbullying, exactly? "Cyberbullying" is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the Internet, interactive and digital technologies or mobile phones. It isn't when adult are trying to lure children into offline meetings, that is called sexual exploitation or luring by a sexual predator. The methods used are limited only by the child's imagination and access to technology. Children have killed each other and committed suicide after having been involved in a cyberbullying incident. Cyberbullying is usually not a one time communication, unless it involves a death threat or a credible threat of serious bodily harm. Cyberbullying may rise to the level of a misdemeanor cyberharassment charge, or if the child is young enough may result in the charge of juvenile delinquency.

101 VIDEO & AUDIO Home Donna Rice Hughes, president and CEO of Enough Is Enough, will be featured on the Executive Report, American Airlines’ exclusive talk radio programming. The Executive Report features interviews with CEO’s from around the globe. Award-winning producer Mark Larson interviewed EIE President Donna Rice Hughes for a 30 minute Internet Safety 101 Radio program. This spot airs in several of the top markets nationwide. Tune in to listen and learn more! Enough Is Enough℠ interviewed top clinicians, psychologists, law enforcement officers, industry representatives as well as parents, teens, victims of Internet-initiated sex crimes, a registered sex offender and others about the most compelling and relevant Internet safety topics today. About Enough Is Enough℠ Introduction: The Perfect Storm Despite the Internet's many wonderful benefits, a perfect storm has emerged for the online victimization of children. Pornography 101 Videos What is Pornography? Pornography: Access Pornography: Harms

Copyright Flowchart: Can I Use It? Yes? No? If This… Then… | Langwitches Blog It is the responsibility of all educators to model good digital citizenship for their students. Especially when it comes to copyright, plagiarism and intellectual property. The waters are murky. It is every educator’s responsibility to become familiar , observe and model for their students! I have written about copyright on this blog many time. The waters are murky, it is not an easy topic. Together with the Academic Technology Team at Graded- The American School of São Paulo, the importance of developing a school policy in regards to copyright was discussed. We did our due diligence in researching and gain a better understanding of how other educational organizations were dealing with copyright policy creation, teacher education and support. We have ubiquitous digital access, ease of duplication and distribution of information. The following infographic chart was developed with an introduction of a New Era of Copyright Consciousness and a suggested simplified flow to follow: Related 23.

The Digital Citizenship Survival Kit | Comfortably 2.0 It's a simple little prop I use when teaching Digital Citizenship to our K-8 #aurorahuskies students. I love utilizing props to try to get my point across to students. To me, it helps a student retain the lesson better. Let me introduce you to Mr. Badura's "Digital Citizenship Survival Kit." Each of the items has a purpose. Here are the items I have in my "Digital Citizenship Survival Kit" and what each item represents: Padlock The padlock is to remind students to set strong passwords and to set up passcode locks on all of their digital devices. Toothbrush I tell students to think that passwords and toothbrushes are very similar in the fact that you NEVER want to share passwords. Permanent Marker Everything that you put online is permanent....even if you hit the delete button after posting. Toothpaste Imagine the information that you are putting online is like the toothpaste coming out of the tube. The survival kit is very simple.

That's Not Cool Nancy Willard: Cyber Savvy: A Web 2.0 Approach to Internet Safety Cyber Savvy: Supporting Safe and Responsible Internet Use Issues related to youth risk online and Internet use management are high on the “radar” in many schools. Following the lead of Virginia, many states also are beginning to require that students be instructed in Internet safety. Student use of Web 2.0 technologies is expanding, along with incredible opportunities for interactive educational activities -- and a host of risk and management concerns. We also are seeing signs of an emerging recognition that the Web 1.0 Internet safety approach -- based on simplistic, fear-based rules -- is ineffective. The understanding also is emerging that youth risk online must be viewed from the perspective of adolescent risk. An effective school-based strategy to address the issue of online safety should include these six key components: Supervision and Monitoring Schools must shift focus from reliance on filtering to better supervision and monitoring.

Facebook for Parents Facebook is How Our Teens Connect Facebook is a huge part of many teens' lives. They use it to keep up with their friends' activities, play games, chat, post photos -- even do homework. And while public sharing always carries some safety and privacy risks (more on that below), with good judgment and strict privacy settings, Facebook can be used safely. What is Facebook? Facebook is an enormous, free social networking site with hundreds of millions of users all over the world. To use Facebook, you sign up with your email address, name, gender, date of birth, and password. As you complete your profile, you can select the people who can view each piece of information. Why it Matters Teens' willingness to share information can surprise -- and even shock -- parents who aren't used to such public disclosure. But Facebook's privacy settings have evolved since the site first started, and its users have evolved, too. How to Help Your Teen Use Facebook Safely Tips for talking to teens about Facebook

Web-monitoring software gathers data on kid chats (AP) -- Parents who install a leading brand of software to monitor their kids' online activities may be unwittingly allowing the developer to gather marketing data from children as young as 7 - and to sell that information. Software sold under the Sentry and FamilySafe brands can read private chats conducted through Yahoo, MSN, AOL and other services, and send that data back to the company. The information is then offered to businesses seeking ways to tailor their marketing messages to kids. "This scares me more than anything I have seen using monitoring technology," said Parry Aftab, a child-safety advocate. "You don't put children's personal information at risk." The software does not record children's names, addresses or other identifiable information, but it knows how old they are because parents customize the programs to be more or less permissive, depending on age. One competitor, CyberPatrol LLC, said it would never consider such an arrangement. The Lite version is free.

Teens So you got naked online? Have you sent naked or sexual pics or video to someone and now regret it? It's not the end of the world. The Cloud - Dream on

Related: