Handout to accompany updated version of presentation delivered at HEA Social Sciences annual conference 2014.
These slides form part of a blog post, which can be accessed via: http://bit.ly/1sqOwEa
A boy is framed for a hacking crime he did not commit and sent to a prison school. He must try to uncover who stole his identity and framed him. The main character is awkward but determined to prove his innocence. Other characters include an aggressive bully and a bitter, depressed teacher. The show would focus on technology and identity theft themes, using a question mark branding to represent the mystery of who framed the main character.
This document provides a series of scenarios and asks the reader to determine if each scenario describes an instance of cyberbullying. The scenarios depict situations involving mean or harassing messages sent online, exclusion from online communication, sharing private information without permission, and ganging up on others in online games. The document is a lesson plan to help teach middle school students about what behaviors constitute cyberbullying.
A 16-year-old girl named Olivia has her laptop hacked, causing her private photos and secrets to be leaked online and leading to bullying. She suspects her best friend Sophie, who set up her social media accounts, but it is later revealed to be her ex-boyfriend Jack. Sophie and Jack are now secretly dating behind Olivia's back. The film will follow Olivia as she tries to discover who hacked her and spilled her private information online, dealing with the resulting bullying, and questioning who she can really trust between her former friend and ex.
Igor Malenko refuses to allow unsupervised visits between Mila and her mother Lori, citing Lori's abusive behavior and false accusations against him. He accuses Lori of prioritizing destroying him over spending time with Mila. Lori maintains she misses Mila and wants to see her per the court order. Their dispute over visitation continues without resolution.
This document contains a student's journal entry for their Social Psychology assignment. It discusses three concepts: false consensus effect, stereotyping, and the halo effect. It provides two personal examples for false consensus effect, where the student's friend assumed all girls wear makeup before going out, and their mother assumed they knew which cleaning tools to use for different surfaces. It also shares experiences with developing stereotypes about foreigners based on news reports, and about students at their university. Finally, it discusses the halo effect in how having an iPod and Macbook led the student to positively evaluate other traits of their sister.
Adam is a 13-year-old boy who enjoys playing video games and hanging out with friends. However, someone created a hate page about him on social media calling him ugly, worthless, and saying he should kill himself. Though initially thinking his tormentors were friends, he began to feel hopeless from their constant bullying posts. The document urges Adam that he does have choices, such as not responding, deleting his accounts, and talking to others for help. It provides information about Maryland's anti-bullying laws and the steps schools take to address cyberbullying reports. It encourages students facing cyberbullying to seek help and not give up.
Cyberbullying takes many forms such as anonymity, flaming, and cyberstalking. It can seriously hurt victims and even lead to suicide. Laws against insults, rumors, and privacy violations may apply to cyberbullying cases. Bystanders can also enable bullying if they do not help victims. People should tell trusted individuals if cyberbullied and block or report bullies. Parents and teachers need to monitor children's technology use and address bullying issues.
A boy is framed for a hacking crime he did not commit and sent to a prison school. He must try to uncover who stole his identity and framed him. The main character is awkward but determined to prove his innocence. Other characters include an aggressive bully and a bitter, depressed teacher. The show would focus on technology and identity theft themes, using a question mark branding to represent the mystery of who framed the main character.
This document provides a series of scenarios and asks the reader to determine if each scenario describes an instance of cyberbullying. The scenarios depict situations involving mean or harassing messages sent online, exclusion from online communication, sharing private information without permission, and ganging up on others in online games. The document is a lesson plan to help teach middle school students about what behaviors constitute cyberbullying.
A 16-year-old girl named Olivia has her laptop hacked, causing her private photos and secrets to be leaked online and leading to bullying. She suspects her best friend Sophie, who set up her social media accounts, but it is later revealed to be her ex-boyfriend Jack. Sophie and Jack are now secretly dating behind Olivia's back. The film will follow Olivia as she tries to discover who hacked her and spilled her private information online, dealing with the resulting bullying, and questioning who she can really trust between her former friend and ex.
Igor Malenko refuses to allow unsupervised visits between Mila and her mother Lori, citing Lori's abusive behavior and false accusations against him. He accuses Lori of prioritizing destroying him over spending time with Mila. Lori maintains she misses Mila and wants to see her per the court order. Their dispute over visitation continues without resolution.
This document contains a student's journal entry for their Social Psychology assignment. It discusses three concepts: false consensus effect, stereotyping, and the halo effect. It provides two personal examples for false consensus effect, where the student's friend assumed all girls wear makeup before going out, and their mother assumed they knew which cleaning tools to use for different surfaces. It also shares experiences with developing stereotypes about foreigners based on news reports, and about students at their university. Finally, it discusses the halo effect in how having an iPod and Macbook led the student to positively evaluate other traits of their sister.
Adam is a 13-year-old boy who enjoys playing video games and hanging out with friends. However, someone created a hate page about him on social media calling him ugly, worthless, and saying he should kill himself. Though initially thinking his tormentors were friends, he began to feel hopeless from their constant bullying posts. The document urges Adam that he does have choices, such as not responding, deleting his accounts, and talking to others for help. It provides information about Maryland's anti-bullying laws and the steps schools take to address cyberbullying reports. It encourages students facing cyberbullying to seek help and not give up.
Cyberbullying takes many forms such as anonymity, flaming, and cyberstalking. It can seriously hurt victims and even lead to suicide. Laws against insults, rumors, and privacy violations may apply to cyberbullying cases. Bystanders can also enable bullying if they do not help victims. People should tell trusted individuals if cyberbullied and block or report bullies. Parents and teachers need to monitor children's technology use and address bullying issues.
The document contains 5 ideas for horror/thriller films:
1. A teenage party turns deadly when a girl is found murdered with a threatening message. Suspicion falls on the main character as others try to figure out who the killer is.
2. A rumor spreads that a school is haunted at night, daring the mischievous main character to investigate. She hears strange noises and learns of the building's haunted history from the caretaker.
3. Two friends chatting online are hacked by an unknown girl who torments and scares them through audio only. Their call cannot be declined.
4. Text messages sent from a deceased girl's phone threaten those who bullied her, wanting them
This document contains ideas for six short horror films. The first idea involves a teenage party where a girl is found murdered with a threatening message written in blood. Suspicion falls on the main character. The second centers around a "ditzy" girl who is dared to explore her supposedly haunted school at night. The third involves two girls being tormented over a webcam by an unknown girl. The fourth deals with threatening texts sent from the phone of a bullied girl after her suicide. The fifth features a bullied girl who starts hearing voices and becomes dangerous after obsessively drawing a strange symbol. The sixth and final idea is about a bullied girl who stops taking her medication and seeks revenge on her tormentors.
Harold Blanco uses his Twitter account strictly for educational purposes, posting links related to his class topics that help students with assignments. Although personal details are absent, he aims to be helpful to his students.
George Couros was an education activist who used Twitter to spread information on important issues and direct people to answers on educational questions. He shared links and engaged others without including personal content.
Unlike his brother George, Alec Couros uses Twitter for both personal and educational purposes. As a professor, he answers student questions while also sharing personal conversations and locations with his followers.
Steven Anderson promotes education as a teacher but also shares personal conversations and inspirational quotes, making his account seem more personable than those focused
The document discusses the effects of cyber bullying, including how it can start as in-person bullying at school but escalate online, leaving victims feeling pressure with no escape. This constant bullying can lead to effects like declining school performance, increased illness, substance abuse, depression, self-harm, and even suicide in the worst cases. One example discussed is Megan Meier, who took her own life after being cyber bullied on MySpace.
This document provides information and advice about internet safety for high school students. It discusses risks like sharing private information online, cyberbullying, and interacting with strangers. It recommends being cautious about sharing personal details or photos, meeting online contacts in person, opening emails from unknown senders, and providing passwords or information in response to messages. The document also includes teaching scenarios and quiz questions related to internet safety best practices.
This document contains ideas for 5 short horror films. The first idea involves a teenage party where a girl is found murdered with a threatening message. Suspicion falls on the main character. The second centers around a "ditzy" girl who is dared to investigate strange noises at her haunted school at night. The third involves two girls being tormented by an unknown girl hacking their webcam chat. The fourth tells of a bullied girl who commits suicide and then sends threatening texts from beyond the grave. The fifth shows a bullied girl who snaps and locks the main bully in a bathroom, becoming obsessed with a strange symbol that seems to take control of her.
This document provides summaries and analysis of two films: Leon (1994) and Pretty in Pink (1986). For Leon, it summarizes the plot as a hitman named Leon who becomes friends with and protects a girl named Mathilda after her family is murdered, and they work together to get revenge on the killer. It also analyzes characters, themes of friendship and revenge, and the unconventional genre subversions. For Pretty in Pink, it summarizes the plot as a girl named Andie in her last year of high school who likes a rich boy but faces resistance from his friends due to her lower social class. It analyzes characters and themes of social class differences and finding your own identity.
This document provides summaries and analysis of two films: Leon (1994) and Pretty in Pink (1986). For Leon, it summarizes the plot as a hitman named Leon who becomes friends with and protects a girl named Mathilda after her family is murdered, and they work together to get revenge on the killer. It also analyzes characters, themes of friendship and revenge, and the unconventional genre subversions. For Pretty in Pink, it summarizes the plot as a girl named Andie in her senior year who likes a rich boy but faces resistance from his friends due to her lower social class. It analyzes characters and themes of social class differences in high school romance.
These vignettes have been produced as part of the HEA-funded project 'Digitalised cultures and spaces of schooling'. For further details of this project please see: http://bit.ly/ZCqNq8
This summary provides an overview of key points from the document in 3 sentences:
The document discusses the impact of new technologies on young people's development and behaviors, citing research showing that digital natives prefer graphics over text, instant gratification, and multi-tasking. Concerns are raised that overuse of technology and social media could negatively impact brain development and hinder the development of social and thinking skills. The document also references the importance of teaching digital literacy skills and maintaining real-life social interactions to balance technology use.
Amanda Todd was a 12-year old girl who was cyberbullied for years, which ultimately led to her suicide. She was praised online for her looks and naively shared private photos, which were then used to blackmail her into performing sexual acts on camera. Even after moving repeatedly, the photos and bullying continued to spread online. After years of isolation and depression, Amanda could no longer take the cyberbullying and shame it brought to her family, so she took her own life at home in 2012. The story illustrates how social media can be misused and how cyberbullying can have tragic consequences, so parents and teachers must educate youth about being careful online.
All Quiet on the Facebook Front: Teens' Social & Mobile Media Privacy Strateg...Jacqueline Vickery
This document summarizes a presentation by Dr. Jacqueline Ryan Vickery on her research into how teens negotiate privacy on mobile and social media. It discusses theories of contextual integrity, properties of social networks, and how mobile devices can paradoxically lead to both freedom and surveillance. Key findings from interviews with teens are that boundaries of privacy are structured by financial constraints, some teens resist how mobile devices reconfigure social spaces and convergence, and they keep some platforms like Tumblr private to protect personal expressions.
The document discusses trends in social media usage among millennials and profiles different types of social media users. It notes that some millennials are moving away from public social networks like Facebook towards more private networks. Stella is profiled as someone who curates a very positive image on Facebook but shares more authentic content privately on Snapchat with close friends. The document suggests Starbucks could attract these socially-private millennials by extending hours and selling alcoholic drinks, allowing for a new kind of social activity experience. A marketing campaign is proposed where customers who bring a friend and post a selfie to a closed social network would receive a free drink reward.
Cyberbullying & Girls' Online Social Performancesashleyquark
The document discusses cyberbullying experiences of 14 adolescent girls aged 13 to 18 through semi-structured interviews. It finds that the effects of cyberbullying, such as feelings of sadness and low self-esteem, are similar to traditional bullying. Girls respond to cyberbullying through retaliation, withdrawal, or moving on. Their experiences online parallel power dynamics faced offline regarding their gender and social roles. The author argues bullying and cyberbullying should not be viewed separately given that similar processes underlie both. Prevention and intervention must address systemic marginalization.
1) The article discusses choosing friends carefully on Facebook and only connecting with people you truly know and trust rather than accumulating hundreds of "friends".
2) It notes that while having many Facebook friends can boost one's ego, most of those connections are not real friends.
3) The author advocates a cautious approach to Facebook by selectively choosing a small circle of trusted friends rather than amassing a large number for boasting purposes.
Young people frequently use technology for both formal learning and informal activities. The document examines research on how 9-16 year olds use the internet, mobile devices, and computers for schoolwork, communication, leisure activities, and creative pursuits. It identifies different categories of technology use among youth, from intensive users who are rarely offline, to ambivalent or unconnected users who are more cautious about overuse. Overall, the research finds that while technology provides opportunities for learning, it can also be distracting, and both opportunities and risks vary depending on a young person's age, access, and orientation toward technology.
This document summarizes findings from focus groups with high school seniors about their use of social networking technologies. Key findings include:
1. Teens keep their online identities separate for school/professional versus personal use, using email for the former and technologies like Facebook for the latter.
2. They consider texting to be the primary means of close communication between real friends while Facebook is for more casual acquaintances.
3. Teens multitask heavily across technologies for both schoolwork and leisure, though acknowledge it reduces quality.
4. Social media plays a large role in teens' social lives and preparations for college, though overuse can reduce personal interaction and privacy is a concern.
5.
This autoethnography examines the author's experiences with and perspectives on social media. It defines autoethnography and explains that the purpose of this project is to study the author's own culture through interactions with social media. The author then describes their basic experiences with social media, including platforms used, types of messages and posts, social media communication, and effects on daily life and communication. Rules for social media use are discussed along with editing, deleting, and privacy settings. Sharing of information, managing social media use, and potential changes to use are also covered. Recurring themes identified include not getting too wrapped up in social media and oversharing by others.
Social media is an important part of teen social lives according to the document. It allows teens to strengthen existing connections by staying in touch with friends even when apart. However, it can also create drama as gossip spreads more widely and quickly online. While social media enables teens to meet new people with shared interests, it also risks hurting feelings if teens are excluded from online social circles or "unfriended". The lines between online and offline interactions are also blurred as many conversations start in one environment and move across various media.
Social media is an important part of teen social lives and allows them to strengthen existing connections. It makes it easy for teens to stay in touch with friends even when separated geographically. However, it can also intensify drama as gossip spreads more quickly online. While social media allows teens to meet new people with shared interests, presenting themselves differently online than in person can create awkward social situations. Managing friend lists and privacy settings is also tricky as unfriending can unintentionally hurt feelings.
This document provides humorous and satirical advice about using various forms of social media, including Facebook, Twitter, YouTube, and online profiles in general. It suggests strategies such as posting excessive amounts, using other people's accounts without permission, harassing celebrities for attention, and using hyperbolic or misleading advertising tactics. The tone is comedic and exaggerated throughout to parody how some may inappropriately or excessively use social media.
The document contains 5 ideas for horror/thriller films:
1. A teenage party turns deadly when a girl is found murdered with a threatening message. Suspicion falls on the main character as others try to figure out who the killer is.
2. A rumor spreads that a school is haunted at night, daring the mischievous main character to investigate. She hears strange noises and learns of the building's haunted history from the caretaker.
3. Two friends chatting online are hacked by an unknown girl who torments and scares them through audio only. Their call cannot be declined.
4. Text messages sent from a deceased girl's phone threaten those who bullied her, wanting them
This document contains ideas for six short horror films. The first idea involves a teenage party where a girl is found murdered with a threatening message written in blood. Suspicion falls on the main character. The second centers around a "ditzy" girl who is dared to explore her supposedly haunted school at night. The third involves two girls being tormented over a webcam by an unknown girl. The fourth deals with threatening texts sent from the phone of a bullied girl after her suicide. The fifth features a bullied girl who starts hearing voices and becomes dangerous after obsessively drawing a strange symbol. The sixth and final idea is about a bullied girl who stops taking her medication and seeks revenge on her tormentors.
Harold Blanco uses his Twitter account strictly for educational purposes, posting links related to his class topics that help students with assignments. Although personal details are absent, he aims to be helpful to his students.
George Couros was an education activist who used Twitter to spread information on important issues and direct people to answers on educational questions. He shared links and engaged others without including personal content.
Unlike his brother George, Alec Couros uses Twitter for both personal and educational purposes. As a professor, he answers student questions while also sharing personal conversations and locations with his followers.
Steven Anderson promotes education as a teacher but also shares personal conversations and inspirational quotes, making his account seem more personable than those focused
The document discusses the effects of cyber bullying, including how it can start as in-person bullying at school but escalate online, leaving victims feeling pressure with no escape. This constant bullying can lead to effects like declining school performance, increased illness, substance abuse, depression, self-harm, and even suicide in the worst cases. One example discussed is Megan Meier, who took her own life after being cyber bullied on MySpace.
This document provides information and advice about internet safety for high school students. It discusses risks like sharing private information online, cyberbullying, and interacting with strangers. It recommends being cautious about sharing personal details or photos, meeting online contacts in person, opening emails from unknown senders, and providing passwords or information in response to messages. The document also includes teaching scenarios and quiz questions related to internet safety best practices.
This document contains ideas for 5 short horror films. The first idea involves a teenage party where a girl is found murdered with a threatening message. Suspicion falls on the main character. The second centers around a "ditzy" girl who is dared to investigate strange noises at her haunted school at night. The third involves two girls being tormented by an unknown girl hacking their webcam chat. The fourth tells of a bullied girl who commits suicide and then sends threatening texts from beyond the grave. The fifth shows a bullied girl who snaps and locks the main bully in a bathroom, becoming obsessed with a strange symbol that seems to take control of her.
This document provides summaries and analysis of two films: Leon (1994) and Pretty in Pink (1986). For Leon, it summarizes the plot as a hitman named Leon who becomes friends with and protects a girl named Mathilda after her family is murdered, and they work together to get revenge on the killer. It also analyzes characters, themes of friendship and revenge, and the unconventional genre subversions. For Pretty in Pink, it summarizes the plot as a girl named Andie in her last year of high school who likes a rich boy but faces resistance from his friends due to her lower social class. It analyzes characters and themes of social class differences and finding your own identity.
This document provides summaries and analysis of two films: Leon (1994) and Pretty in Pink (1986). For Leon, it summarizes the plot as a hitman named Leon who becomes friends with and protects a girl named Mathilda after her family is murdered, and they work together to get revenge on the killer. It also analyzes characters, themes of friendship and revenge, and the unconventional genre subversions. For Pretty in Pink, it summarizes the plot as a girl named Andie in her senior year who likes a rich boy but faces resistance from his friends due to her lower social class. It analyzes characters and themes of social class differences in high school romance.
These vignettes have been produced as part of the HEA-funded project 'Digitalised cultures and spaces of schooling'. For further details of this project please see: http://bit.ly/ZCqNq8
This summary provides an overview of key points from the document in 3 sentences:
The document discusses the impact of new technologies on young people's development and behaviors, citing research showing that digital natives prefer graphics over text, instant gratification, and multi-tasking. Concerns are raised that overuse of technology and social media could negatively impact brain development and hinder the development of social and thinking skills. The document also references the importance of teaching digital literacy skills and maintaining real-life social interactions to balance technology use.
Amanda Todd was a 12-year old girl who was cyberbullied for years, which ultimately led to her suicide. She was praised online for her looks and naively shared private photos, which were then used to blackmail her into performing sexual acts on camera. Even after moving repeatedly, the photos and bullying continued to spread online. After years of isolation and depression, Amanda could no longer take the cyberbullying and shame it brought to her family, so she took her own life at home in 2012. The story illustrates how social media can be misused and how cyberbullying can have tragic consequences, so parents and teachers must educate youth about being careful online.
All Quiet on the Facebook Front: Teens' Social & Mobile Media Privacy Strateg...Jacqueline Vickery
This document summarizes a presentation by Dr. Jacqueline Ryan Vickery on her research into how teens negotiate privacy on mobile and social media. It discusses theories of contextual integrity, properties of social networks, and how mobile devices can paradoxically lead to both freedom and surveillance. Key findings from interviews with teens are that boundaries of privacy are structured by financial constraints, some teens resist how mobile devices reconfigure social spaces and convergence, and they keep some platforms like Tumblr private to protect personal expressions.
The document discusses trends in social media usage among millennials and profiles different types of social media users. It notes that some millennials are moving away from public social networks like Facebook towards more private networks. Stella is profiled as someone who curates a very positive image on Facebook but shares more authentic content privately on Snapchat with close friends. The document suggests Starbucks could attract these socially-private millennials by extending hours and selling alcoholic drinks, allowing for a new kind of social activity experience. A marketing campaign is proposed where customers who bring a friend and post a selfie to a closed social network would receive a free drink reward.
Cyberbullying & Girls' Online Social Performancesashleyquark
The document discusses cyberbullying experiences of 14 adolescent girls aged 13 to 18 through semi-structured interviews. It finds that the effects of cyberbullying, such as feelings of sadness and low self-esteem, are similar to traditional bullying. Girls respond to cyberbullying through retaliation, withdrawal, or moving on. Their experiences online parallel power dynamics faced offline regarding their gender and social roles. The author argues bullying and cyberbullying should not be viewed separately given that similar processes underlie both. Prevention and intervention must address systemic marginalization.
1) The article discusses choosing friends carefully on Facebook and only connecting with people you truly know and trust rather than accumulating hundreds of "friends".
2) It notes that while having many Facebook friends can boost one's ego, most of those connections are not real friends.
3) The author advocates a cautious approach to Facebook by selectively choosing a small circle of trusted friends rather than amassing a large number for boasting purposes.
Young people frequently use technology for both formal learning and informal activities. The document examines research on how 9-16 year olds use the internet, mobile devices, and computers for schoolwork, communication, leisure activities, and creative pursuits. It identifies different categories of technology use among youth, from intensive users who are rarely offline, to ambivalent or unconnected users who are more cautious about overuse. Overall, the research finds that while technology provides opportunities for learning, it can also be distracting, and both opportunities and risks vary depending on a young person's age, access, and orientation toward technology.
This document summarizes findings from focus groups with high school seniors about their use of social networking technologies. Key findings include:
1. Teens keep their online identities separate for school/professional versus personal use, using email for the former and technologies like Facebook for the latter.
2. They consider texting to be the primary means of close communication between real friends while Facebook is for more casual acquaintances.
3. Teens multitask heavily across technologies for both schoolwork and leisure, though acknowledge it reduces quality.
4. Social media plays a large role in teens' social lives and preparations for college, though overuse can reduce personal interaction and privacy is a concern.
5.
This autoethnography examines the author's experiences with and perspectives on social media. It defines autoethnography and explains that the purpose of this project is to study the author's own culture through interactions with social media. The author then describes their basic experiences with social media, including platforms used, types of messages and posts, social media communication, and effects on daily life and communication. Rules for social media use are discussed along with editing, deleting, and privacy settings. Sharing of information, managing social media use, and potential changes to use are also covered. Recurring themes identified include not getting too wrapped up in social media and oversharing by others.
Social media is an important part of teen social lives according to the document. It allows teens to strengthen existing connections by staying in touch with friends even when apart. However, it can also create drama as gossip spreads more widely and quickly online. While social media enables teens to meet new people with shared interests, it also risks hurting feelings if teens are excluded from online social circles or "unfriended". The lines between online and offline interactions are also blurred as many conversations start in one environment and move across various media.
Social media is an important part of teen social lives and allows them to strengthen existing connections. It makes it easy for teens to stay in touch with friends even when separated geographically. However, it can also intensify drama as gossip spreads more quickly online. While social media allows teens to meet new people with shared interests, presenting themselves differently online than in person can create awkward social situations. Managing friend lists and privacy settings is also tricky as unfriending can unintentionally hurt feelings.
This document provides humorous and satirical advice about using various forms of social media, including Facebook, Twitter, YouTube, and online profiles in general. It suggests strategies such as posting excessive amounts, using other people's accounts without permission, harassing celebrities for attention, and using hyperbolic or misleading advertising tactics. The tone is comedic and exaggerated throughout to parody how some may inappropriately or excessively use social media.
The document discusses the author's use of social media and how her profiles on platforms like Facebook, Twitter, Snapchat, and Instagram may be perceived by others. She documents how often she checks these sites in a day and asks friends to view her Facebook profile to give impressions of her based on her posts and photos. Common responses referred to her sense of humor. The author also took an online quiz about what her profile says about her, which described her as modern, confident, and more of a lurker than an active contributor. She concludes that while social media allows control over one's online presence and can be an escape, her generation depends on it too much rather than experiencing the world directly.
This document presents 10 digital behaviors for staying safe online:
1. Avoid inappropriate sites for one's age.
2. Use the internet to learn and improve knowledge.
3. Understand that liberty means not hurting others.
4. Do not provide personal information when visiting sites.
It also discusses being careful about sharing details online, only sharing what you'd say publicly, and not posting plans or personal information that could get you into trouble. Users should protect their passwords and only share with people they fully trust. When interacting with others online, respect privacy, get consent before sharing information, and accept different opinions.
This slideshow aligns with the YouTube video: http://www.youtube.com/watch?v=xGNjfiubPKQ This webinar has been developed by the Academy Technology Seminar 3 students of Palisades High school (11th grade). Guided by Mr. Robert Reilly (teacher) and Mrs. Karen Hornberger (librarian). The topic was the issues that accompany friend requests. This specific webinar was produced for the 4th, 5th, and 6th grade levels; the 11th grade students felt that the primary age group could use the guidance.
Teenagers are heavily reliant on mobile phones and social media for communication. According to a study:
- 75% of teenagers have mobile phones and spend 1-2 hours per day on them for texting, social media, photos, and games.
- Nearly 90% of teens send 50+ texts per day and 1/3 send 100+ daily, establishing texting as their primary means of communication.
- 73% use social media sites like Facebook for over an hour each day to connect with friends, share photos and updates, and communicate.
- While mobile phones and social media help teens socialize and express themselves, they can also lead to isolation, bullying, and an overreliance on digital
What We Don’t Want to Know About Teenagers Online.Huw Davies
The document discusses research into how teenagers use the internet. It finds that teenagers can be grouped into categories like socializers, pragmatists, academics, non-conformists, and PC gamers based on their internet habits. Each group has different levels of independence, skills, and motivations online. The research also uncovered challenges in fully understanding teenagers' agency online due to intersecting influences like gender and corporate/government powers shaping the digital world.
Similar to Discussion handout for 'The digitalised spaces and cultures of schooling' - Sara Bragg (20)
This document provides a list of resources for curriculum design in 2014 following discussions at workshops in June 2013. It includes resources for the new national curriculum in England being introduced in 2014 as well as curriculum information for Northern Ireland, Scotland, and Wales. The list contains references to publications, reports, and websites on topics related to curriculum design, principles of curriculum development, and curriculum innovation. All items are in alphabetical order and provide enough detail to locate each resource.
This document provides a list of resources on assessment themes in alphabetical order. It includes websites, publications, and other resources from organizations like the Assessment Reform Group and individual authors like Paul Black and Dylan Wiliam. The list was originally created based on recommendations from workshops in the UK in 2012 to provide a record of contributors' views, and is not intended to be exhaustive. Links were last checked in February 2016.
In 2012 the Higher Education Academy worked with teacher educators from across the UK to curate a list of useful resources in this area. Kathy Wright has maintained and updated this list.
This document discusses student engagement through partnership between higher education institutions and students. It provides a framework to support partnership and explores opportunities and challenges, such as issues of inclusivity, power relationships, and defining terms of engagement. The document also outlines conceptual models of partnership in areas like learning, teaching and assessment. It examines tensions around partnership and opportunities to further explore areas like pedagogies of partnership and disciplinary approaches.
Slides to support short presentation by Kathy Wright at the 2015 HE and FE Show in London on 14 October. The presentation is taken from previous keynotes by Dr Abbi Flint of the Higher Education Academy.
This document summarizes a presentation on staff development workshops aimed at stimulating academics' teaching practices. It discusses common staff development formats, more innovative formats explored in 6 HEA workshops, and themes that emerged from participant feedback. Workshops incorporating creative and interactive activities facilitated new ways of thinking and discussion that prompted some changes to participants' continuing professional development and consideration of implementing new approaches. However, the workshops' short duration and lack of follow up posed challenges to transferring learning and changing practice. The document recommends providing explicit theory, lengthening workshops, and follow up to better support impacts on teaching.
This report contains the preliminary findings from a research project that aimed to explore:
• What is the current practice around teaching social science research methods to undergraduate medical students in the UK: what is being taught, how are teaching and learning organised within the curriculum, how is content is delivered, to and by whom and how is student learning assessed?
• And, what are the challenges and opportunities around developing this teaching and learning practice and the curriculum and policy contexts that frame it?
The document discusses the debate around whether students should be allowed to use laptops and other devices in the classroom with "lids up" or be required to have "lids down." It presents perspectives from academics and students on both sides of the debate, including arguments that devices can boost engagement but may also encourage distraction, and that banning devices may improve focus but prevent students from fact-checking understanding. The document also explores how technology affects different types of learning and engagement, and models for determining appropriate educational technology use.
This workshop was held as part of the HEA Enhancement Event 'Technology enhanced learning: What can we learn from MOOCs?'. The presentation forms part of a blog post about this workshop which can be accessed via: http://bit.ly/1AbOtCA
For further details of the enhancement event, please see: https://www.heacademy.ac.uk/events-conferences/event10203
This document discusses student partnership in higher education. It defines partnership as a specific form of student engagement that focuses on learning relationships and working arrangements between staff and students. The document presents a conceptual model of partnership that can occur through learning, teaching and assessment; subject-based research and inquiry; scholarship of teaching and learning; and curriculum design. It also discusses some tensions in partnership, such as issues of inclusivity, power relationships, and defining roles and responsibilities. The document advocates that higher education institutions learn from both successes and failures of partnership programs to improve impact and address ethical implications.
This presentation is linked to a workshop presented at the HEA Enhancement event ‘Successful students: enhancing employability through enterprise education’. The blog post that accompanies this presentation can be accessed via http://bit.ly/1wVOUxf
This presentation is linked to a workshop presented at the HEA Enhancement event ‘Successful students: enhancing employability through enterprise education’. The blog post that accompanies this presentation can be accessed via http://bit.ly/1wVOUxf
This document presents a generic modular framework for implementing innovation and commercialization-oriented curricula through scenario-based and experiential learning. The framework is adaptable and scalable, covering topics like opportunity recognition, intellectual property, finance, and business strategy. Assessment includes feasibility reports, presentations, research tasks, and reflective logs.
The School of Bioscience applies this framework through student "company teams" that invent marketable biotech products addressing global issues. External speakers provide discipline-relevant content, and weekly plans guide students through a scenario culminating in a feasibility report and company pitch. Feedback indicates the innovative methodology develops students' commercial awareness and employability skills.
This presentation is linked to a workshop presented at the HEA Enhancement event ‘Successful students: enhancing employability through enterprise education’. The blog post that accompanies this presentation can be accessed via http://bit.ly/1wVOUxf
This presentation is linked to a workshop presented at the HEA Enhancement event 'Ways of knowing, ways of learning: innovation in pedagogy for graduate success'. The blog post that accompanies this presentation can be accessed via http://bit.ly/13zCShG
This presentation is linked to a workshop presented at the HEA Enhancement event ‘Successful students: enhancing employability through enterprise education’. The blog post that accompanies this presentation can be accessed via
This presentation is linked to a workshop presented at the HEA Enhancement event 'Ways of knowing, ways of learning: innovation in pedagogy for graduate success'. The blog post that accompanies this presentation can be accessed via http://bit.ly/1yYJket
This presentation is linked to a workshop presented at the HEA Enhancement event 'The full picture: the journey from listening to partnership in student engagement'. The blog post that accompanies this presentation can be accessed via http://bit.ly/129riIW
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
Chapter wise All Notes of First year Basic Civil Engineering.pptxDenish Jangid
Chapter wise All Notes of First year Basic Civil Engineering
Syllabus
Chapter-1
Introduction to objective, scope and outcome the subject
Chapter 2
Introduction: Scope and Specialization of Civil Engineering, Role of civil Engineer in Society, Impact of infrastructural development on economy of country.
Chapter 3
Surveying: Object Principles & Types of Surveying; Site Plans, Plans & Maps; Scales & Unit of different Measurements.
Linear Measurements: Instruments used. Linear Measurement by Tape, Ranging out Survey Lines and overcoming Obstructions; Measurements on sloping ground; Tape corrections, conventional symbols. Angular Measurements: Instruments used; Introduction to Compass Surveying, Bearings and Longitude & Latitude of a Line, Introduction to total station.
Levelling: Instrument used Object of levelling, Methods of levelling in brief, and Contour maps.
Chapter 4
Buildings: Selection of site for Buildings, Layout of Building Plan, Types of buildings, Plinth area, carpet area, floor space index, Introduction to building byelaws, concept of sun light & ventilation. Components of Buildings & their functions, Basic concept of R.C.C., Introduction to types of foundation
Chapter 5
Transportation: Introduction to Transportation Engineering; Traffic and Road Safety: Types and Characteristics of Various Modes of Transportation; Various Road Traffic Signs, Causes of Accidents and Road Safety Measures.
Chapter 6
Environmental Engineering: Environmental Pollution, Environmental Acts and Regulations, Functional Concepts of Ecology, Basics of Species, Biodiversity, Ecosystem, Hydrological Cycle; Chemical Cycles: Carbon, Nitrogen & Phosphorus; Energy Flow in Ecosystems.
Water Pollution: Water Quality standards, Introduction to Treatment & Disposal of Waste Water. Reuse and Saving of Water, Rain Water Harvesting. Solid Waste Management: Classification of Solid Waste, Collection, Transportation and Disposal of Solid. Recycling of Solid Waste: Energy Recovery, Sanitary Landfill, On-Site Sanitation. Air & Noise Pollution: Primary and Secondary air pollutants, Harmful effects of Air Pollution, Control of Air Pollution. . Noise Pollution Harmful Effects of noise pollution, control of noise pollution, Global warming & Climate Change, Ozone depletion, Greenhouse effect
Text Books:
1. Palancharmy, Basic Civil Engineering, McGraw Hill publishers.
2. Satheesh Gopi, Basic Civil Engineering, Pearson Publishers.
3. Ketki Rangwala Dalal, Essentials of Civil Engineering, Charotar Publishing House.
4. BCP, Surveying volume 1
This document provides an overview of wound healing, its functions, stages, mechanisms, factors affecting it, and complications.
A wound is a break in the integrity of the skin or tissues, which may be associated with disruption of the structure and function.
Healing is the body’s response to injury in an attempt to restore normal structure and functions.
Healing can occur in two ways: Regeneration and Repair
There are 4 phases of wound healing: hemostasis, inflammation, proliferation, and remodeling. This document also describes the mechanism of wound healing. Factors that affect healing include infection, uncontrolled diabetes, poor nutrition, age, anemia, the presence of foreign bodies, etc.
Complications of wound healing like infection, hyperpigmentation of scar, contractures, and keloid formation.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
Leveraging Generative AI to Drive Nonprofit InnovationTechSoup
In this webinar, participants learned how to utilize Generative AI to streamline operations and elevate member engagement. Amazon Web Service experts provided a customer specific use cases and dived into low/no-code tools that are quick and easy to deploy through Amazon Web Service (AWS.)
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
Discussion handout for 'The digitalised spaces and cultures of schooling' - Sara Bragg
1. The view from the back of the classroom
Research perspective: young people’s media cultures and relationships with screens, social media,
new technology and gaming have been extensively explored by scholars of childhood and youth, and
sociologists and cultural studies academics interested in new media. However, schools often
respond by deriding or excluding them, seeing them as hostile to educational goals and values, and
constructing both children and teachers as ‘at risk’ from their supposed reconfiguring of
professional and intimate boundaries.
What does the vignette, below, suggest about young people’s:
- literacies
- identities (gendered, sexual etc) and communities
- concepts of privacy and ethics
- visibility and participation in online world
- ideas about labour and enterprise?
Vignette: Alannis and her ‘virtual schoolbag’*
* the idea of the virtual schoolbag comes from Pat Thomson - the things that students bring to
school but that many of them never get a chance to unpack because the school isn’t interested in
them (from a SoE lecturer during discussions)
Alannis is 14 and in Year 10. She is a fan of Union J – known as a J Cat - and is interested in
youtubers such as JacksGap, Tyler Oakley, danisnotonfire and amazingphil; the latter she discovered
‘through a random link on Twitter’ before they rapidly became well-known, with a show on Radio
One. “There’s this thing on YouTube, like YouTubers, there’s loads of them and that’s their job they
just get paid to make videos, all these skits and things… some do pranks, some do advice, some do
things about their life…. They’re really lucky because they don’t have to get up and go to work ….
So now everybody wants to be a YouTuber because it’s like a super easy job, but you get like paid
really well”.
As part of her fan activities she has a Twitter account (plus several ‘fake’ ones created with a
friend), with over 500 followers, mostly people she doesn’t know. Other J Cats have ‘update
accounts’, usually in their ‘ship’ names (ship means, who you would like the band members to be in
a relationship with, so Josh and George = Gosh). These “tell you what they are up to and where
they are in the country so you can try to meet them…. Stalking them basically”. Fans pool their
knowledge of where the band members are at any point by deciphering their twitter feeds; for
instance, they might deduce that they are returning from a tour and turn up at the airport to wait
for them.
She also uses wattpad.com, a fan fiction site for posting one’s own writing and reading others’ work;
Instagram, what’s app and iMessage for talking to her friends.
She doesn’t really use Facebook – “Facebook is for school, but I don’t really go on it cos it’ really
boring now, Facebook, but usually, like, school fights happen through Facebook and stuff like that”.
She is also cautious and distinguishes herself from others who ‘tend to put themselves out there’.
She explains: “I don’t post much. I’m mainly tagged in things. There’s just… some embarrassing
photos of me that I’ve been tagged in. Nothing too bad. If it was just my wall. If it was my news feed
there would be a lot of stuff, but that’s not to do with me.”
She and a friend have a youtube channel on which they post short films. When I ask her if I can look
at it (assuming it must therefore be ‘public’ anyway), she immediately messages her friend to ask if
2. that’s ok; and in fact even when given permission, I find it’s impossible to identify amidst the
thousands of similarly named channels. She explains that she doesn’t tell anyone she knows about it,
and how a friend who posted a link to her youtube film on her Twitter account was embarrassed
when friends saw it – she’d ‘forgotten’ that she had some friends as well as strangers following her
on Twitter, and her carefully managed boundaries were breached. She presents a blunt ethical
position that to upload a video is to invite all types of audience exposure: “I think when people are
being mean on YouTube it’s kind of like, you shouldn't have uploaded the video then”. In regards to
her own channel, she describes how “no one watches it, which I don’t mind because then no one’s
being mean!”
She cannot use Twitter or iMessage at school as she does this on her iPad which she doesn't take
in.
The school bans the use of mobile phones “but everyone has them. Loads of people like text under
the table [in lesson time]… If a teacher sees someone texting they will take their phone off and tell
them to collect it at the end the week”. This rule means that she will risk using her phone more on
a Thursday or Friday because “they have to give them back on Friday anyway”. She remarks that
the photos on her friends’ phones provide insights into when teachers leave the classroom, because
then “everyone takes them out and like, starts taking photos”. Alannis claims only to text herself
for something really urgent “like if I forget something, I’ll text my mum can you bring this”. She also
however uses her phone for legitimate learning purposes: “I look up the definitions of words in
English I don’t understand cos I tend to be a bit too shy to ask”. But this would still be against the
rules and result in confiscation.
Alannis uses her on line activities as reward and inducement for doing homework: “When I come
home I try to do my homework, then spend like ages on my ipad, on youtube mostly …. we have
three pieces of homework, so I do one, then think I can spend 20 minutes on twitter and you tube,
then I do another….”.