Wednesday, 6 January 2016

Self Evaluation

You know, sometimes all you need is twenty seconds of insane courage. Just literally twenty seconds of just embarrassing bravery. And I promise you, something great will come of it. -Thabo Mose.

Recommended Reading


Ross, ST. 2011. Albion. [Online]. Available at: http://www.albion.com/netiquette/corerules.html [Accessed May 2015].

Rideout, R. 2006. Blogger. [Online]. Available at: http://netiquetteisimportant.blogspot.com/2006/11/bad-netiquette-has-consequences.html [Accessed May 2015].

SAHRC. nd. [Online]. Available at: http://www.sahrc.org.za/home/21/files/Reports/My%20rights%20...%20Eng%20booklet.pdf [Accessed May 2015].

Google Sites. nd. [Online]. Available at: https://sites.google.com/site/digitalcitizenshipdferris/digital-rights-and-responsibilities [Accessed May 2015].

Acorn. nd. [Online]. Available at: http://www.acorn.gov.au/what-is-cybercrime/ [Accessed May 2015].

Google Images. nd. [Online]. Available at: https://www.oyunfor.com/dosyalar/images/Clash%20of%20clans/1194881812-Clash_of_clans_22.png [Accessed May 2015].

Norton. nd. [Online]. Available at: http://za.norton.com/cybercrime-prevention [Accessed May 2015].

History of Ecommerce. 2004. [Online]. Available at: http://www.ecommerce-land.com/history_ecommerce.html [Accessed May 2015]

OCT. nd. [Online]. Available at: https://www.otc.edu/Documents_Academic_Integrity/Avoiding_plagiarism.pdf [Accessed May 2015]

Bailey, J., 2010. Plaigiarism Today. [Online] Available at: https://www.plagiarismtoday.com/2010/01/12/how-to-correctly-use-creative-commons-works/ [Accessed May 2015].

Fielding, M. & du Plooy-Cilliers, F., 2014. In H. Thorne, ed. Effective Business Communication In Organisation. 4th ed. Claremont, South Africa: Juta & Company Ltd.

The Independent Institution of Education, 2015. Digital Citizenship Module Manual. 1st ed.
  

Complaiance With general Requirements

Welcome to the Digital Citizenship Website

Digital Citizenship is a concept which helps teachers, technology leaders and parents to understand what students/children/technology users should know to use technology appropriately. Digital Citizenship is more than just a teaching tool; it is a way to prepare students/technology users for a society full of technology. Digital citizenship is the norms of appropriate, responsible technology use.  Too often we are seeing students as well as adults misusing and abusing technology but not sure what to do. The issue is more than what the users do not know but what is considered appropriate technology usage.

Overview of the Nine Elements


information fluency
Information fluency is about interpreting information unconsciously and intuitively so that we are able to extract knowledge, interpret its meaning and significance
solution fluency
Solution fluency is about problem solving – solving a problem presented to us through an intuitive process. It requires the ability to interpret information and extract knowledge so that we are able to find a solution to the problem
media fluency
Media fluency is actually two-fold, the first involves the interpretation (listening) of the media; the second, involves how we leverage this for our own output (communication). 
This fluency involves both the communication aspect, as well as the literacy. We cannot produce something without knowing how to use the technology, but we cannot leverage the message without understanding this. Therefore, there may be some repetition between the two units. 
Crockett, Jukes and Churches (2011:58) believe that media fluency means being a “‘prosumer’ – an effective consumer and producer of digital content”. The first part of this process is explained in this unit, whereas the Leverage process is explained in communication
collaboration fluency
All over the world there are people who are communicating and working together…yet they may never meet face to face! The reality is with today’s technology, distance has become a concept that is relative. The authors of the book “Literacy is not enough” (Jukes, Churches, Crockett, 2011) worked on an entire project without ever meeting face-to-face until after the completion thereof! So how did they do it? Well, they had already mastered the skill of collaboration as well as being digitally literate. In this section we will look at the steps involved with the process.
 creativity fluency

Presentation

The digital society is here, so what is digital citizenship? Just as we are citizens of a physical country, so are we citizens of the digital world. Just as we need to obey the laws, and not harm anyone, that same spirit exists in the digital world – and it impacts the physical world as well. The mean words and pictures that are posted online, can hurt people in their daily lives at school and in their community.

But citizenship means more than behaving responsibly, it also means that we should be civically engaged: voting, keeping current and having our voice in political matters, and contributing to society. To this end, we need to get accurate information, and decide the verity of political messages that surround us. This same pro-active attitude and behavior also applies to the digital environment. Technology enables us to research significant social issues and to voice our opinions to a global audience.

In short, digital citizenship means the ability to use technology safely, responsibly, critically, and pro-actively to contribute to society

Digital citizenship is a worthy endeavor, and it is also the law. California AB 307 requires district technology plans to “include a component to educate pupils and teachers on the appropriate and ethical use of information technology in the classroom.” Governor Arnold Scharzenegger’s Executive Order   S-06-09 established a California ICT Digital Literacy initiative, asserting that “it is an important goal to ensure that California residents are digitally literate." Similarly, the federal S 1492 Broadband Data Improvement Act (Public Law 110-385), also titled Protecting Children in the 21st Century Act, mandates that all schools receiving e-rate discounts must teach students “about appropriate online behavior, including interacting with other individuals on social networking sites and in chat rooms and cyberbullying awareness and response.”
Overview of the Nine Elements


These acts focus on technological education, especially the K-12 area. The federal act targets minors, and emphasizes web 2.0 activities such as social networking and cyberbullying. The state act includes teachers into the educational mix, and has a more positive spin of ethical literacy and digital citizenship as well as a broader scope. The governor’s order has a lifelong agenda. As such, you will see resources for the entire school community because digital citizenship is a 24/7 endeavor.

The site http://k12digitalcitizenship.wikispaces.com is a central wiki for digital citizenship. Below is the outline for each module. The links below will take you to the specific learning session. Work at your own pace to explore and do activities to increase your understanding. We encourage you to keep a blog as a means to record and share your experiences.
 
 

Digital Commerce



PLAGIARISM GUIDELINES
Informative
 
  • Discuss the issue of plagiarism regularly with students - at least at the start of each term.
  • Make sure every student has a copy of the University's official plagiarism prevention brochure. These can be obtained from all the libraries.
  • Make sure students understand the main concepts of plagiarism, intellectual property, copyright and fair dealing.
  • Make them aware of the UP, faculty and departmental policies and regulations (Afrikaans | English) - stress the connection between the definition of plagiarism and the policies and regulations.
  • Warn students about the seriousness of the offence and the consequences of plagiarism for their academic and professional careers. Spell out the penalties which may be incurred.
  • Make them aware of all available help. 
  • Place copyright and plagiarism warnings prominently in study guides.
  • Include an anti-plagiarism slide in every MS PowerPoint presentation used for lecturing.
  • Refer students to available resources.
Educative
 
  • Be a positive role model: provide proper references to your lecture notes.
  • Discuss the issue in terms of values: 1) Plagiarism is theft of words and ideas and simply not done by a decent and honest person. 2) Plagiarism violates our values of trust and academic integrity. Academic integrity, a cornerstone of scholarship, may be a new concept to them. It is defined as respecting the work of other scholars in return for their respect for your work.
  • Discuss the issue in terms of intellectual property, fair use and the role that referencing (citing) plays in the advancement of science.
  • Explain the reasons for referencing (citing).
  • Discuss the benefits of proper citation: it shows you have read about the subject, that your views are tied to that of experts and it helps the reader to locate the sources.
  • Teach them the skills of academic writing, especially quoting, paraphrasing, summarizing and citating, and make sure they observe it.
  • "Cyberplagiarism" (plagiarizing the Internet) is a particular problem at the moment: familiarize yourself with the citing of web sources and teach the correct style to your students. 
  • Stress the need for original, critical thinking.
  • Make sure students are information literate. Contact your information specialist for help in this regard.
Preventative
 
  • Rethink the design and assessment of assignments:
    1. reconsider exactly what you want to assess, 
    2. make sure everybody understands the assignment,
    3. make it relevant to future employment or research, 
    4. integrate different elements of assessment, 
    5. beware of broad, general topics,
    6. if possible, use very current topics,
    7. change topics regularly,
    8. be specific about expectations:  length, type of sources, currency, style, scope,
    9. provide citation standards and examples,
    10. spell out your interpretation of collaboration,
    11. allow enough time,
    12. check sources in bibliographies randomly,
    13. include some specific required reading for each assignment,
    14. require interaction and feedback by way of oral presentations or written feedback from other students.
  • Insist on a declaration of academic integrity to accompany each assignment. Click here for a printable copy of the University's official cover sheet.
  • Deal with detected plagiarism in a fair and consistent manner within the UP regulations (Afrikaans | English).
  • Familiarise yourself with the phenomenon of essay banks or paper mills (for an overview see http://www.jiscpas.ac.uk/apppage.cgi?USERPAGE=6250)
  • Let your students know that you have a good grasp of plagiarism issues and have resources available for tracking it down.
  • Use electronic detection tools if available in your faculty or school.
  • Do not turn a blind eye because it is painful and time-consuming
ONLINE AUCTIONS AND TIPS,

Know the seller

There are several ways in which you can check out a seller.
  • Does the online auction site have the ability to view the sellers other auctions, by looking at this you can decide wether they are traders or not.
  • Does the online auction site have a seller feedback area, if so check out what other buyers have said about the seller, sometimes buyers can rank a seller, if the seller has bad feedback and ratings do the sensible thing and avoid them or your negative feedback will be joining the others.
  • Does the seller have a history of selling items, although if a history and feedback were always required there would be no new sellers, you can still gain confidence for your first few buys by taking these two into account.
  • Is the seller using an anonymous email account, they could be completely honest, but generally dishonest sellers will not have traceable email addresses.
  • Before bidding send the seller an email, especially if they are a new seller, just think of a simple relevant question to ask that is not covered in the description of the item. Good sellers are serious about their sales and will respond quickly, fully and politely. After all do not forget YOU ARE THE CUSTOMER.
  • Does the seller appear to be knowledgable about the item they are selling, this can go a long way to avoid buying fakes, because it is less likely the seller bought fakes in the first place.
  • How does the seller want to be paid? If they want cash chances are you won`t see your item or your cash. For reasons of traceability and some recourse you should try and stick with a credit card payment.
  • When does the seller require payment? If its a short fixed period you may wish to look elsewhere as making payments other than credit card can be delayed and anyway YOU ARE THE CUSTOMER and you should be allowed to pay within a reasonable amount of time.
  • What is the return policy for the item. If its not good don`t bother, you are relying on a photo and a description, the item may arrive and not be what you thought.
  • What is the shipping rate? Has the seller inflated the rate to make more money, if so you need to decide wether the item is worth it and if the seller is worth doing business with when they use practises like that.

Hidden Costs

Check out these costs before you bid, the item may not be worth it.
  • What is the shipping rate? Do your sums, add up the shipping costs, you may need to email the seller to find out the weight and dimensions of the item. ( a good excuse to get in touch )
  • Is delivery type specified, does the item really need to go by the most expensive or fastest way.
  • Does the item require insurance for its journey, if so how much will this cost?
  • Make sure multiple items are shipped and charged as one bulk delivery, not as many separate small deliveries which will be more expensive.
  • If you are using an escrow service how much will it cost.
  • Are there any taxes to pay, import duties may apply for International buyers.
  • Various payment methods cost and should also be added to your hidden costs equation.
ONLINE AUCTIONS AND TIPS

Know the item

Check out the item before you bid.
  • What would the item cost new from a retailer, is the saving worth it?
  • Always print out the items description, you may need a hard copy later if a dispute arrises.
  • Images are most important for many items, they should be clear well lit, of a size that is easy to view, not a professional stock picture and without any signs of tampering such as retouching, always print them out you may need it if a dispute arrises.
  • Do some research, you may have plenty of time to research the item before bidding. Online auctions can run for weeks.
  • Search the online auction site for similar items before bidding.

Online Auction Scams

Check out these scams before you bid.
  • Shilling
    The most frequent scam. The sellers and their cohorts bidding the price of an item higher so that the winning buyer (you) ends up paying for the item at a higher price than you would otherwise have.
  • Bid Shielding
    A buyer places a low bid and is then followed by other buyers (partners) who take the bidding up very high compared to the real value of the item, at the last moment the high bidders withdraw their bids and leave only the initial low bid remaining. Basically you end up selling the item for a lower than expected price and no one else has bid because of the high bids that have been withdrawn.
  • Faked Photos
    Its so easy to make something look good or even replace it entirely and take a picture. Once the image is digitized further enhancements can be made. Look at the picture carefully, does it look like a stock shot? Does it have any areas of blur or fuzziness? (a sure sign it has been tampered with) Does it match the description? Print it out and also save it to disc, you may need it later
  • Untrue/Misleading Descriptions
    Again anything can be written about anything. When did you last buy a car, was that dent, rust, bad paint job in the description of the ad, of course not, sellers may fail to mention things they see as minor but you see as major faults and of course the same goes for auctions. Does the description match the picture? Is it a detailed description or just the make and model, sellers should give detailed descriptions and even point out faults, if you contact a seller before bidding and find that a lot of bad stuff has been left out of the description ask yourself if you want to do business with this person.
  • Failure to Deliver Merchandise
    Usually online auctions require the buyer pay for the merchandise before receiving the goods. So you have paid, the cheque has been cashed and you have not received your goods. First contact the seller, if you get no response contact the auction site hosting the auction, tell them the situation and request any details they may be able to give you.
    Be sure to keep a record of all conversations, correspondence and cancelled cheques.
    Many auction sites now require sellers to give credit card details for identification before they can sell, for obvious reasons choose your auction site carefully.

    In the US this is a crime and is classed as mail fraud so take legal advice.

    If the item is expensive use an Escrow service.
    Does the auction site provide insurance, if so it can save you money.
  • False Feedback
    Visit the online auction's buyer feedback page. Sellers are rated by past buyers. The feedback systems can be easily manipulated by the seller using false user accounts and/or by their partners. If a seller has a perfect feedback rating this can mean they are either totally honest and timely with their sales or they are dishonestly posting false feedback, there is no easy way to spot false feedback, although, an average rating is probably a good thing, after all very few people are perfect. If you get burned be sure to let others know by using the feedback sections.
  • Switch and Return
    You as a seller have sent your goods to the buyer, the buyer then switches your goods for older, copied or broken goods of the same nature and contacts you saying they are not satisfied with the goods and demanding a refund.
    You do not know this until the goods have been returned to you, so what do you do?
    Do not give refunds until you have the goods back.
    Before sending the goods take photos of them, describe them and note any model numbers, serial numbers or unique identifying marks.
    Contact the buyer and let them know you know and the evidence you have, then offer to return the goods to them when you receive payment for re-shipping.
  • Pirated or Stolen goods
    If you think the goods may be pirated or stolen contact the seller and ask for details of where and how they acquired the goods, then contact the original supplier to confirm. Software and designer goods are particularly subseptible to this.
Finally: If you follow the guidelines above and advice elsewhere on the Internet you should have no problems. Auctions are the best place for bargains and hard to find items.

Digital Health and Wellbeing

Interactive Elements of the Internet

Individuals and groups are increasingly using interactive tools that offer innovative ways to share ideas and resources on the Internet. These include such technologies as listservs, Usenet, and chat systems that simulate conventional forms of communications online, and can be incorporated into Web sites. NIDRR grantees may want to examine some of these options to see if they could enhance their efforts to gather and share information about disability research via the Web. Some grantees are already using them effectively and might serve as resources for others.

Listservs

Electronic mailing lists known as listservs expand the concept of e-mail and are a staple of Internet discussion. Rather than sending a message to one person's e-mail address, sending to an automated "listserv" address allows you to contact an entire list of subscribers. The subscribers are people interested in the general topic of the list. Listserv is the type of software that redirects the mail to all subscribers.
Listservs can either be moderated or unmoderated. A moderated list receives input in the form of e-mail from its subscribers that can be collated, edited and sent back out to the readership. A moderator controls the flow of mail to the list. An unmoderated listserv allows any subscriber to send messages and have them automatically sent to everyone on the list without review.
There are thousands of mailing lists available through the Internet covering many specialized topics. Researchers and educators at universities might start a list for discussing pertinent issues with colleagues. Non-profit organizations may have an announcement listserv for keeping people updated on the organization's events, and individuals with particular hobbies may have a list for meeting others with their interests.
The NCDDR has created and maintains several listservs to assist in facilitating communication among NIDDR-affiliated individuals, including:
  • RRTC Research Directors
  • work group for a general RRTC World Wide Web site
  • work group for a general RERC Web site
  • dissemination committee of the Model Spinal Cord Injury System (MSCIS) projects
  • NCDDR's Multicultural Task Force
A number of grantees also operate listservs as part of or in conjunction with their NIDRR projects.These are described in a separate article (see p. 7) Three indices for listserv discussions include:
Starting a listserv mailing list requires some assistance from a system administrator, or you can make use of sites that offer free list hosting services.

Usenet newsgroups

Like listservs, newsgroups allow individuals to post questions, comments, and suggestions for review and response by other readers. Internet newsgroups form the "Usenet," which is the mass of hierarchically and topically oriented text-based forums for people to post messages. Usenet newsgroups are similar to public bulletin boards where anyone can post messages on any subject. Unlike listserv messages which show up in your private mailbox and may only have a select group of readers, newsgroup postings are carried by publicly-accessible servers all over the world, and can have an audience of millions. Some newsgroups are regulated and have a set of guidelines, either in the form of a charter or a Frequently Asked Questions (FAQ) document, that people should read and follow before posting messages.
Accessing the Usenet can be done through newsreading software, such as Forte's Free Agent for PCs, or MT-Newswatcher for Macs, which then connects to a news server to list and retrieve postings. Internet service providers often have a server dedicated to Usenet messages. Most of this software combines e-mail and newsreading functions into one package, so switching between the two is easy. Netscape, for example, builds the capability to connect to Usenet servers into its Communicator software, while Microsoft offers an e-mail/newsreader addition to its Internet Explorer browser called Outlook Express.
Web gateways to Usenet that do not require separate newsreading software, such as the free DejaNews or the fee-for-service Newsguy, also exist. Both of these allow newsgroups to be searched and read directly from their Web sites, as well as messages to be posted online.

Web Bulletin Boards

An alternative to newsgroups are Web-based discussion forums, or bulletin boards, which are hosted on a specific Web server. These bulletin boards are private and may be monitored. They are often more convenient than either listservs or Usenet groups because they can be accessed through a Web browser and integrated into a Web site. Web bulletin boards vary greatly in appearance and complexity, and may be customized for your site's need.
One popular option is the Ultimate Bulletin Board, which comes in both free and professional versions. A demonstration of this forum can be seen on the NCDDR's Web site for Rehabilitation Research and Training Centers: <http://www.ncddr.org/rrtc/forum/cgi/Ultimate.cgi>. As with other Internet resources, there is a search engine available to find Web bulletin boards: Forum One tracks and indexes over 180,000 such discussion forums.

Online Chat

Even more interactive are the various forms of direct online discussion ("chatting"). A chat, in virtual-spaces identified as "channels" or "rooms," allows multiple people to simultaneously communicate by typing comments back and forth, in real-time. This way of communicating is transitory as it is only viewed by participants as the discussion occurs, although a chat log may be saved for later review. Online chatting has the benefit of being immediate, mirroring such real-world concepts as teleconferencing, and can be used as an alternative or supplemental way to talk to a large group. Chats can be closed (admittance by password) and scheduled for particular topics or to speak with a special guest, for instance— or they can be open and available continuously for anyone who might happen to stop by. In either case, the communications are often informal, with active chatters creating their own electronic slang or "Netspeak."
The best known chatting system is the "Internet Relay Chat" (IRC) in which thousands of people simultaneously take part in chats about numerous topics, on hundreds of servers worldwide. IRC predates the Web; it was originally developed in Finland in 1988 to replace the "Talk" program which let a single Internet user type messages to one other. Most online chatting programs are modeled on IRC.
Many servers are available for public use, and each "chatter" must have client software to be able to connect to a server and join a chat room or channel. While public chat servers are used primarily for socializing, running the hosting software on a private system would make it feasible for research and work groups to conference in online meetings. The original IRC software required learning a variety of commands, but newer versions are easier to use. Commercial derivatives are available for many platforms and can be accessed from separate IRC software, or directly in a Web page via Java.

NIDRR Grantees and Web Interactivity

These and other evolving technologies can be incorporated into grantees' Web sites to increase interaction with other researchers and members of the greater public audience. The purpose and goals of such interaction must be specified ahead of time. Some strategies (such as a chat) require more effort in terms of monitoring and guiding the interaction. Others require more resources in terms of server and hardware and/or software.
As with all Internet technologies, the use of interactive components must consider accessibility for varied users. Screen readers can manage text-based formats, such as those employed in listservs, Usenet, and IRC, but may have difficulty with Java implementations. Grantees should strive to make their Web sites as accessible as possible for all potential visitors.

TWO OTHER ELEMENTS.

Addiction

The definition for addiction is the fact or condition of being addicted. In our modern world there are many internet related factors which may cause people to use the internet for excessive hours daily. One major aspect are the internet games teenagers are interested in. It is not healthy to play computer or internet games for too long. To truly comprehend the impact that the internet can have on us, here are some affects of long term use of the internet:
  • Lack of sleep and feeling tired throughout the day.
  • Feeling separated when not near the computer or internet.

It’s important to set a certain time limit and adhere to it. This will help to learn to do something other than using the internet for games. Overall the internet can be very helpful for all kinds of research and shouldn't mainly be used for fun games.
http://www.youtube.com/watch?v=m1cky3eFGJU

Ergonomics

Ergonomics is a complex name given to a simple concept. The basic idea of this is the safe physical use of the computer. This can include many aspects such as: sitting on the chair correctly, holding the mouse lightly and the right distance which we sit at from the computer. The are many different things a computer user can do to lower the risk of any physical pain and to increase his/her productivity while using the computer. This can include simple exercises which warm and loosen-up the body.
http://www.youtube.com/watch?v=8cyumcU_3G8

Digital Security

SECURRTY
This research group out of Harvard includes Danah Boyd. Live web casts and chat. The Berkman Center's Interactive collection features conversations with and talks by leading cyber-scholars, entrepreneurs, activists, and policymakers as they explore topics such as: the factors that influence knowledge creation and dissemination in the digital age; the character of power as the worlds of governance, business, citizenship, and the media meet the Internet; and the opportunities, role, and limitations of new technologies in learning.

Berkman Center Archives: Interactive .
         
The Berkman Center's Interactive collection features conversations with and talks by leading cyber-scholars, entrepreneurs, activists, and policymakers as they explore topics such as: the factors that influence knowledge creation and dissemination in the digital age; the character of power as the worlds of governance, business, citizenship, and the media meet the Internet; and the opportunities, role, and limitations of new technologies in learning.


 Responding to the Challenge of Online Social Aggression, Threats, and Distress                     
                 
 
This book belongs in every school district! Nancy Willard is Director of the Center for Safe & Responsible Internet Use and a noted expert and speaker on the challenges and legal issues related to technology use in the schools. Her book helps school administrators analyze and intervene in cases involving cyberbullying or cyberthreats. She includes illustrative examples, recommendations for practice, and many practical resources. Available through Amazon.com


CTAP 4 Cybersafety Project: School Administrator Resources                     
          
 
CTAP Region IV has designed this collection of Administrator Resources specifically with the needs of school administrators in mind.\n\nA companion component, Acceptable Use, covers policies around computer and internet usage, cell phones, cyberbullying and social networking. Be sure to check the six other areas of our cybersafety web site for resources that address the curriculum and educational needs of classroom teachers, parents and students.


Ruling: Schools must archive eMail                     
                    
 
New rules make eMail, instant messages subject to legal review. According to new federal rules that went into effect Dec. 1, schools, businesses, and other organizations are required to keep tabs on all eMail, instant messages (IM), and other digital communications produced by their employees.


Court sides with MySpace in suit over sex assault                     
         
The 5th U.S. Circuit Court of Appeals upheld the dismissal of a lawsuit that a Texas girl's family filed against MySpace and its parent company, News Corp. The family said MySpace didn't protect young users from sexual predators.The court ruled that the Communications Decency Act of 1996 "bars such lawsuits against Web-based services like MySpace."


Federal lawmaker targets cyber bullying                     
May 27, 08
Prompted by outrage over a Missouri teen's suicide after an internet hoax, United States Rep. Kenny Hulshof on May 22 introduced a bill that would impose federal criminal penalties for cyber bullying. "The Megan Meier Act would give prosecutors the tools to protect kids from the most egregious of online predatory attacks," Hulshof said in a statement. Hulshof's bill would allow federal prosecutors to go after online messages meant "to coerce, intimidate, harass, or cause emotional distress" to others. Those convicted under the measure would face a fine or up to two years in jail.


Easy eMail Archiving                     
May 27, 08
A collection of stories from the eSchool News archives, as well as some additional resources, to help you make an informed decision as you evaluate your school or district's eMail archiving needs.


Define The Line: Downloading, File Sharing and Copyright Law                     
May 28, 08
<b>Define the Line</b> is an awareness program designed to educate students about using commercial software legally, respecting copyrighted works online and understanding the impact of software theft on all of us. Sponsored by the Business Software Alliance (BSA).


Bebo party story is fake--lawsuit is not                    
 
Don't believe everything you read on Bebo.

That's the message an angry mother is sending by suing six U.K. newspapers that lifted a story off social-networking site Bebo about her daughter's supposed wild party.

  • Lawyers told the paper that the case may be a legal landmark because there is no precedent in disputes involving third parties who use or publish information from social-networking sites. Hudson's lawyer, David Price, noted that the case raised important issues of libel, privacy, and copyright and added that, due to social-networking sites, teenager's embellished rumors are now on display like never before.

HB 669 prohibits the bullying or harassment, including cyber bullying, of any public K-12 student or employee. It requires the Department of Education to adopt a model policy to prohibit bullying and harassment and directs all school districts to adopt a similar policy. School districts are directed to work with students, parents, teachers, administrators, and local law enforcement on developing this policy. School districts will be required to report all instances of bullying or harassment and to notify the parents of the bully and the parents of the victim.


 Digital Natives »The Ballad of Zack McCune (Part III)                     
                         
In April of last year, Zack McCune was sued by the RIAA. He ended up $3,000 lighter (he settled), but with a much richer understanding of the contemporary debate surrounding music, copyright law, and file sharing. Part I gives an intro to his story, while Part II explores the disconnect between young downloaders and the recording industry. Part III, presented here, concludes Zack’s misadventure and examines where it led him: to the Free Culture Movement, which advocates more flexible intellectual property law.


 Bullying Beyond the Schoolyard: Preventing and Responding to Cyberbullying                     
                        
<b>Bullying Beyond the Schoolyard: Preventing and Responding to Cyberbullying </b> <br /><br /> Co-authors <b>Dr. Sameer Hinduja</b> and <b> Dr. Justin W. Patchin</b> provide a comprehensive guide to identify, prevent and respond to this increasingly serious problem. The book is primarily based on Hinduja and Patchin's original research with thousands of adolescents, many of whom were victims of cyberbullying. In addition to providing numerous practical strategies for educators, parents and other youth-serving adults, the book includes personal stories and case scenarios, an extensive overview of terminology and legal issues, and a clear explanation of the scope and prevalence of online aggression among youth. <br /><br />


New mobile cyber safety in Florida 2                               
                        
Attorney General in Florida!!! Nailed a vendor on cyberfraud charges and translated it into $1 million for Cybersafety Education programs!

  • In addition to the new injunctive standard, the agreement also provides for a payment of $1 million to the Attorney General to be used to fund additional investigations into CyberFraud and to further CyberSafety education. The Attorney General encouraged any Florida consumers who believe they have been victimized by unauthorized charges for mobile content to contact their wireless cell phone carrier for refunds.
  • n addition to the new injunctive standard, the agreement also provides for a payment of $1 million to the Attorney General to be used to fund additional investigations into CyberFraud and to further CyberSafety education. The Attorney General encouraged any Florida consumers who believe they have been victimized by unauthorized charges for mobile content to contact their wireless cell phone carrier for refunds.

 Cyberbullying - Bullying Beyond the Schoolyard [New Book]                     
                         
Teens and tweens have been bullying each other for generations. The bullies of today, however, have the advantage of utilizing technology such as computers, cell phones and other electronic devices to inflict harm on others. <b>"Bullying Beyond the Schoolyard: Preventing and Responding to Cyberbullying," </b>due out this month, uncovers the types of youth most susceptible, how they felt, who they told, how they coped and how it affected their lives, and illustrates the gravity of cyberbullying and its real-world repercussions. The co-authors, [Justin Patchin, Ph.D. and Sameer Hinduja] both have backgrounds in Criminal Justice and are university-based. Their web site, <b><a href = "http://www.cyberbullying.us/"> Cyberbullying.Us</a></b> is dedicated to identifying the causes and consequences of online harrassment.


Tips for Dealing with Cyberbullies                     
                        
<b>Tips for Dealing with Cyberbullies</B> from the U.S. Computer Emergency Readiness Team.


MySpace Mom's Behavior Hateful But Not Illegal                     
                         
Lori Drew, the "cyberbully" mom who has been accused of indirectly causing the suicide of a MySpace teen member may have acted heinously, but not illegally, according to a group of Internet legal advocacy groups who filed a legal brief yesterday in the U.S. District Court in California.



Fair Use Guidelines for Educational Multimedia Projects                     
                
These guidelines were developed during the Conference on Fair Use. Educators and students are advised to exercise caution in using digital material downloaded from the Internet in producing their own educational multimedia projects, because there is a mix of works protected by copyright and works in the public domain on the network. Access to works on the Internet does not automatically mean that these can be reproduced and reused without permission or royalty payment and, furthermore, some copyrighted works may have been posted to the Internet without authorization of the copyright holder.\n



Make your students and staff aware of the potential infringements. Most teachers and students use music in their video and then publish or use in it in a public setting while thinking they’ve done nothing wrong. But, their lack of knowledge about the laws does not make them immune. \n


Miami teen sues archdiocese over bullying, 'hate page' 3                               
                        
A teenage girl has sued her private, all-girls Catholic school, claiming it allowed bullying to spread from the classroom to online social networks.


  • According to the filing, the victim, whose name was not included in the lawsuit, was verbally and physically taunted at school by classmates and that the harassment eventually moved online to Facebook, where she was allegedly targeted with a "hate page." That site allegedly broadcast a threat to "kill the flea," referring to the victim.
  • Agosta says the bullies were suspended for their actions, but the lawsuit claims the harassment continued, and included threats of harm to retaliate for reporting the behavior.
  • The plaintiff is seeking more than $15,000 in damages and claims she is suicidal and suffers from flashbacks and anxiety.

      Agosta said the continued bullying online could not have happened on school grounds, saying students must leave their cell phones in lockers and that the school does not have Internet access, though an online course catalog for the school includes a Web design course whose topics include learning to "access the World Wide Web."

      "Cyberbullying cannot occur at the school because they don't have access," the spokeswoman said.
CREATIVE IMAGES.