Middle School ICT students investigate the positives and negatives of accessing digital media. Students also engage in activities centered on their own Digital Footprints as they access technological resources and digital media.
Windows 10 has deep cloud hooks and shares a lot of data with Microsoft in order to create a smart, seamless experience across devices. If you prefer to keep some privacy, here's how to disable all of it.
Successfully exploiting the vulnerabilities could allow an attacker to spy on users, or even completely take over the device.
Researchers with Zimperium have identified multiple critical remote code execution vulnerabilities in Android's Stagefright code that can be exploited on 95 percent of devices – an estimated 950 million – by simply sending an MMS message.
Three in 10 school districts lack anti-bullying policies, including addressing cyberbullying. Only two in 10 require professional development for their educators on bullying or have district accountability for reporting of bullying incidents.
Hackers have successfully extracted login details for Google's Gmail email service from a Samsung smart fridge. The details were unveiled at the recent DEFCON hacking conference, fuelling concerns about the privacy of Internet of Things devices.
Classroom technologies such as smartphones, tablets, computers, and wireless internet access offer exciting opportunities to enhance and deepen the learning process. However, using technology in the classroom can also bring multiple distractions to students. Without your proactive supervision, students might access games, web pages, and social networking sites as you deliver instruction.
As an educator, how can you confront this dilemma? Read on to learn the various ways on how you can minimize the digital distraction in your classroom.
The proactive knowledge looks at concrete examples of how educators as role models and our students can proactively take ownership of being a safe and responsible Digital Citizens. Experiential knowledge is linking these good practice tips to real life scenarios and activities. Vicki uses current scams and cons in her classroom as discussion points with her students. For example: Snopes (a reference source for urban legends, folklore, myths, rumors, and misinformation) has a section on frauds and scams e.g. phishing and identity theft. Other examples might be gathered from current news articles. There are many ‘newsworthy’ articles where individuals have not been good digital citizens, and there is much to be learnt from others mistakes.
As more kids use mobile phones and surf the web at increasingly younger ages, sexting and Internet safety are becoming bigger childhood health concerns, edging out longtime worries like smoking and teen pregnancy, a new poll suggests.
How do you personalize learning? First you need to know what personalized learning is. Here is a new site that provides resources, research, models, examples, and stories. This page provides a toolkit that can help your organization begin personalizing learning to meet the needs of all learners.
Check out the chart that compares Personalization, Differentiation, and Indivdiualization. You can download the chart and a report that explains the details of the chart. The Three Stages of Personalized Learning Environments can help you determine where you are in personalizing learning.
Universal Design for Learning (UDL) provides the framework in personalizing learning for all learners. UDL also guides the design of the Personal Learner Profile[TM]. It provides the UDL lens to select the appropriate tools for the Personal Learning Backpack[TM]. UDL guides how Personalized Learning meets the Common Core.
Twitter is pretty awesome and everyone needs it in their lives. But like with any technology, there are safety concerns, privacy concerns, kids' security concerns, and so on. Twitter has launched a new initiative to address all these matters. Twitter Safety Center is a comprehensive resource built by the social network to address all of…
It's a tragic thing indeed, but sometimes the biggest bully on the team is the coach. Both of my kids have experienced bully coaches, to varying degrees and with different outcomes. I've even experienced a bully coach as an adult playing rec sports.
Most parents who use social media today find information about raising children through their networking sites and care little about what information friends and family share on social media about their kids, a new study finds.
Sharing your scoops to your social media accounts is a must to distribute your curated content. Not only will it drive traffic and leads through your content, but it will help show your expertise with your followers.
How to integrate my topics' content to my website?
Integrating your curated content to your website or blog will allow you to increase your website visitors’ engagement, boost SEO and acquire new visitors. By redirecting your social media traffic to your website, Scoop.it will also help you generate more qualified traffic and leads from your curation work.
Distributing your curated content through a newsletter is a great way to nurture and engage your email subscribers will developing your traffic and visibility.
Creating engaging newsletters with your curated content is really easy.