background preloader

What is Cyberbullying

What is Cyberbullying
Cyberbullying is bullying that takes place using electronic technology. Electronic technology includes devices and equipment such as cell phones, computers, and tablets as well as communication tools including social media sites, text messages, chat, and websites. Examples of cyberbullying include mean text messages or emails, rumors sent by email or posted on social networking sites, and embarrassing pictures, videos, websites, or fake profiles. Why Cyberbullying is Different Kids who are being cyberbullied are often bullied in person as well. Cyberbullying can happen 24 hours a day, 7 days a week, and reach a kid even when he or she is alone. Effects of Cyberbullying Cell phones and computers themselves are not to blame for cyberbullying. Kids who are cyberbullied are more likely to: Use alcohol and drugs Skip school Experience in-person bullying Be unwilling to attend school Receive poor grades Have lower self-esteem Have more health problems Frequency of Cyberbullying

Video Games Play May Provide Learning, Health, Social Benefits, Review Finds WASHINGTON — Playing video games, including violent shooter games, may boost children’s learning, health and social skills, according to a review of research on the positive effects of video game play to be published by the American Psychological Association. The study comes out as debate continues among psychologists and other health professionals regarding the effects of violent media on youth. An APA task force is conducting a comprehensive review of research on violence in video games and interactive media and will release its findings in 2014. “Important research has already been conducted for decades on the negative effects of gaming, including addiction, depression and aggression, and we are certainly not suggesting that this should be ignored,” said lead author Isabela Granic, PhD, of Radboud University Nijmegen in The Netherlands. The article will be published in APA’s flagship journal, American Psychologist.

Cyberbullying: How Bullies Have Moved From the Playground to the Web Over the past decade, the world of learning and education has become steadily more immersed in the technology available to our modern society. From elementary school students using laptops in class, to collegiate learning taking place online, such as through online bachelor’s degree programs, students are plugging in, signing on, and becoming ever more engaged in the digital and cyber world. While the tight-knit relationship between education and technology has afforded some incredible learning opportunities, like in the burgeoning world of online college education, as technology penetrates younger and younger demographics, certain social problems become apparent: namely, cyberbullying. The frequency with which kids and teens are being bullied online has risen at an alarming rate. Embed the image below on your site Embed the image above on your site June 29th, 2012 written by Site Administrator

NetSmartz Teens Presentation Title CloseX About Us Donate Language: Login Register Teens Presentation Download Presenter's Guide Learn Teach Watch About Us | Contact Us | Legal Information | Site Map Copyright © 2001-2017 National Center for Missing & Exploited Children.

Help Protect Your Child's Online Reputation From Damage | Safetyweb Cyberbullying simply refers to the act of bullying online. This type of bullying can consist of any of the following actions committed by an individual or group to another individual or group: Threats of violence Hate speech Harassment Peer pressure Bribery Psychological abuse Extortion Further, these offenses are often committed by people impersonating someone else, anonymously, or under the guise of a group, making accountability and preventability difficult. The definition of cyberbullying has broadened over the years since it has expanded to include any number of internet connected devices, web sites, behaviors, victims, and victimizers. Most computer usage was still limited to desktop computers Broadband internet connectivity was more limited Most mobile devices were not equipped with cameras and/or data services Social Networks were not mainstream Given these constraints, you did not hear about it as much as it was generally less frequent, and was usually confined to smaller groups.

4 Ways for Teachers to Stay Safer Online- NetSafe Utah 1) Acceptable Use Policies (AUP) AUP's are "contracts" that outline how students can use the technology, what they cannot do with it and the consequences for violating the policy. These should include school web pages and the content that is allowed on them. AUPs should be signed by an authorized representative of the school, students and parents so that all concerned parties are aware of the policy. 2) No Student Names It is recommend that when referring to students on a web page that either their names not be used or only their first names be posted. 3) Student Pictures You are encouraged to post student work that may include student pictures; however, you should get written permission to post student pictures and work before placing it onto the web. 4) School or Classroom Web Pages Made available with permission of Stevens Institute of Technology; the Trustees of the Stevens Institute of Technology, Hoboken, NJ 07030. Learn More About These Risks NetSafe Pledges Additional Resources:

CSS3 & HTML5 Identity Theft Methods According to the Federal Trade Commission (FTC), identity thieves can obtain information by rummaging through trash or stealing from purses, wallets, mailboxes, or homes.[1] They may also use electronic methods, such as those listed below. Phishing relies on pop-ups, spam, and websites that look authentic to obtain personal information, such as log-in information and credit card numbers. Pharming uses malicious code to redirect users to fraudulent sites where hackers can access their personal information. These scams are sometimes accomplished with the use of malware (software designed to damage computers). Once identity thieves obtain a victim’s personal information, they may use it to run up charges on credit cards, open additional accounts, take out loans, lease property, or apply for a driver’s license. Protecting Yourself The number one rule when it comes to protecting yourself from identity theft is pay attention! Responding to Identity Theft

7 Awesome Emmet HTML Time-Saving Tips 7 Awesome Emmet HTML Time-Saving Tips Emmet, formerly Zen Coding, is one of the most downright practical and productive text editor plugins that you will ever see. With its ability to instantly expand simple abbreviations into complex code snippets, Emmet makes you feel like a powerful coding wizard with the world at your fingertips. As a follow up to our previous article on the basics of Zen Coding, today we’re going to dive into seven awesome tips to help you become a true Emmet pro. 1. Our first tip is that you rarely need to type out “div” in your macro. As you can see, both abbreviations yield the same result. Implicit Tag Names This quirk is actually part of a greater feature called “implicit tag names”, which attempts to interpret the tag that you want based on context. 2. If you’re using Emmet to expand simple class names into divs, good for you, you’re off to a decent start. Climbing Up Now let’s move on and look at moving up the tree. 3. 4. 5. 6. 7. Try Them Out!

Excellent Video Clips on Plagiarism to Share with Your Students 1- What is Plagiarism 2- A Quick Guide to Plagiarism 3- Plagiarism: a film by Murdokh 4- Avoid Plagiarism in Research papers with paraphrases and quotations 5- Before he cheats: A teacher parody 6- 10 types of plagiarism Apuntes Skamasle | Manuales y Tutoriales