background preloader

10 Things Your Students Should Know About Their Digital Footprints

10 Things Your Students Should Know About Their Digital Footprints
Building a digital legacy is an issue I believe doesn’t garner enough attention in our personal and professional lives. In fact, some of the heaviest users of online tools and social media are our young students, who are growing up as a generation of visual learners and visual attention seekers. This is in fact the Facebook and YouTube generation, and the reality is that many teens are unconcerned about the dangers of sharing personal information online. A highly respected education advocate, Kevin Honeycutt, once asked me if any of us from our generation (GenX and before), had ever made a mistake in puberty. He then asked if our mistakes are “Googleable.” The reality is that our mistakes from puberty are not “Googleable”. With that in mind, I have developed some important facts and opinions that our students should be completely aware of as they live in their digital world, creating digital footprints along the way. 10 Things Your Students Should Know About Their Digital Footprints 1. 2.

How Apple and Amazon Security Flaws Led to My Epic Hacking | Gadget Lab In the space of one hour, my entire digital life was destroyed. First my Google account was taken over, then deleted. Next my Twitter account was compromised, and used as a platform to broadcast racist and homophobic messages. In many ways, this was all my fault. Had I been regularly backing up the data on my MacBook, I wouldn’t have had to worry about losing more than a year’s worth of photos, covering the entire lifespan of my daughter, or documents and e-mails that I had stored in no other location. Those security lapses are my fault, and I deeply, deeply regret them. But what happened to me exposes vital security flaws in several customer service systems, most notably Apple’s and Amazon’s. This isn’t just my problem. ‬The very four digits that Amazon considers unimportant enough to display in the clear on the Web are precisely the same ones that Apple considers secure enough to perform identity verification.‪ I realized something was wrong at about 5 p.m. on Friday. Lulz. “Wait. “Mr.

Helping Students Create Positive Digital Footprints - ASCD Annual Conference 2012 Christine Fisher When asked what words come to mind when they think about students posting to the Internet, many educators list words like danger and safety. But with the likes of Robert Nay—who created one of the most downloaded iPad apps of 2011 when he was just 14—and even Justin Bieber—who began his international superstardom as a YouTube sensation—as inspiration, students and teachers alike should know the positives that posting to the Internet can offer. This was the message Steve Johnson, a technology skills teacher, parent, and author of two education books, shared during his Saturday session, "Digital Footprints: Your Students' New First Impression." "The main idea we get from surveying teachers [about students posting online] is there [are] a lot of negative connotations," Johnson said, as he aimed to reverse these negative perceptions and encourage educators to promote student-produced online content in their classrooms. "They are going to make mistakes," he said.

How School Librarians Can Assist You:Internet Safety and Filtering Insafe, a network of national nodes that coordinate Internet safety awareness in Europe makes the case for empowerment as the key to online safety. Safety risks are increased …”in the online environment by the fact that we can’t usually see whom we are communicating with, probably don’t know who provided the data we are accessing, and online content comes without any quality assurance from a reputable publisher or editor. In order to compensate for this, we need to develop our information literacy skills and behave in a more discriminating manner when online.” The following resources for parents should help you to better understand the complexities of the online environment and provide you with the tools to keep your child safe when online. Bullying.org Center for Safe and Responsible Internet Use (CSRIU) This site hopes to mobilize educators, parents, students, and others to combat online social aggression. Children's Internet Protection Act CyberSmart! CyberSmart! Digizen.org InSafe

Cyberbullying What does cyberbullying look like? Children can cyberbully each other in a number of ways including: abusive texts and emails hurtful messages, images or videos imitating others online excluding others online nasty online gossip and chat Cyberbullying can happen to anyone, however often the children involved in cyberbullying are also involved in other kinds of bullying. Cyberbullying is the use of technology to bully a person or group. Cyberbullying can involve social, psychological and even, in extreme cases, physical harm. Because children and young people are often online it can be hard for them to escape cyberbullying. How teachers can help Research shows students often don’t tell adults about cyberbullying. Responding to cyberbullying If you notice a child in your class or the school yard showing any of the above signs, or other worrying and out of character behaviours, tell them you are worried and want to help. Safe schools address cyberbullying before it happens >Useful websites

How Public Schools Can Constitutionally Halt Cyberbullying: A Model Cyberbullying Policy that Considers First Amendment, Due Process, and Fourth Amendment Challenges – Wake Forest Law Review Introduction Schoolyard bullying has been around for generations, but recently it has taken on a new, menacing face¾cyberbullying. Now adolescents use technology to deliberately and repeatedly bully, harass, hassle, and threaten peers. No longer does the bullying end once the school day ends. With the use of technology, groups of bullies can relentlessly and anonymously attack twenty-four hours a day for the whole world to witness. Cyberbullying is one of the top challenges facing public schools.[3] There are many recurring legal problems confronting public schools. Assume instead that Joe creates an animated video game of Jane from his personal home computer at night. Can the school punish Joe or any of the other students? Neither the legislatures nor the courts have been able to give public schools clear and consistent guidance on how to answer these questions. I. Recent cases: There have been far too many recent cyberbullying cases that have ended in such tragedy. A.

Cyberbullying .:. WiredSafety Cyberstalking and Cyberharassment In the early days of cyberabuse, when WiredSafety's volunteers first offered help to victims of cyberstalking and cyber-harassment in 1995, cyberstalking and cyberharassment were defined differently. Now cyberstalking and cyberharassment are lumped together along with any way adults use digital technology to torment, harass, intentionally annoy or set their victims up for attacks by unwitting third parties (like hate groups and violent individuals). While this short article summarizes cyberharassment, WiredSafety has more resources and more experience than any other online group on the issue of cyberharassment, cyberstalking and cyberbullying (minor-to-minor). Visit our tutorials, take a class or two online with us, visit our help channel or refer your case to our WiredPatrol Internet Response Team for help form our specially-trained volunteers. The one thing you need to understand about cyberharassment is that you shouldn't have to live with it.

Cases and Codes Cases citing this case: Supreme CourtCases citing this case: Circuit Courts TINKER v. DES MOINES SCHOOL DIST., 393 U.S. 503 (1969) TINKER ET AL. v. DES MOINES INDEPENDENT COMMUNITY SCHOOL DISTRICT ET AL. CERTIORARI TO THE UNITED STATES COURT OF APPEALS FOR THE EIGHTH CIRCUIT. Petitioners, three public school pupils in Des Moines, Iowa, were suspended from school for wearing black armbands to protest the Government's policy in Vietnam. 1. Dan L. Allan A. Charles Morgan, Jr., filed a brief for the United States National Student Association, as amicus curiae, urging reversal. [393 U.S. 503, 504] MR. Petitioner John F. In December 1965, a group of adults and students in Des Moines held a meeting at the Eckhardt home. The principals of the Des Moines schools became aware of the plan to wear armbands. On December 16, Mary Beth and Christopher wore black armbands to their schools. On appeal, the Court of Appeals for the Eighth Circuit considered the case en banc. In West Virginia v. Footnotes

What is cyberbullying? Cyberbullying occurs when a child or teen is embarrassed, humiliated, harassed, tormented or otherwise targeted by another person using the Internet or other form of digital communication. Understanding the motives of cyberbullies can assist parents and professionals in developing effective prevention and intervention strategies that are necessary to combat cyberbullying. According to www.stopcyberbullying.org, there are generally five types of cyberbullies. seeks attention from peers maintains control by intimidating victim was cyberbullied or bullied in person in the past seeks revenge on bullies may be less popular, but usually has above average computer skills bullies for entertainment value and to alleviate boredom (e.g., at a slumber party) aims to increase her own popularity by putting others down seeks revenge on behalf of those who have been bullied or cyberbullied aims to protect friends doesn't see himself/herself as a cyberbully return to top of page

Cybersafety Jefferson Middle School 1115 S. Crescent Drive Champaign, IL 61821 Phone: (217) 351-3790 Fax: (217) 351-3754 7:50am - 2:35pm In partnership with our parents and community, we are committed to connecting students to their futures through academic excellence, developmental responsiveness and social equity. Corporate Sponsors:Body-n-SoleOld Time Meat and DeliPapa Murphy'sTCBY Jefferson Journal:02-28-14PBIS Matrix Jefferson Middle School gladly serves a culturally diverse student body while educating through a social justice lens.

Related: