Cyberbullying involves using technology to harass or bully others and can lead to anxiety, depression, and even suicide. Some tips to prevent cyberbullying include pledging to stand against it, not using technology as a weapon to hurt others, and supporting those being bullied. Facebook offers features to control who can tag you, unfriend or block bullies, and report abusive content in order to help prevent cyberbullying.
This document summarizes Bret L. Simmons' personal branding workshop that took place on December 9-10, 2010 in Reno, Nevada. The agenda covered introducing personal branding philosophies and operating principles, new rules of marketing using online tools like Google profiles, LinkedIn, blogs, Twitter and Facebook. Simmons emphasized consistently contributing value through online content and conversations to build a personal brand and spread the word about one's expertise.
How to Stand against Cyberbullying on Facebooktechexpert2345
ย
Pledge to take a stand against Cyber-bullying, Beware of using technology as a weapon to hurt others, Try not to be a bystander of oneโs bullying, and much more.
This document discusses internet safety from a Christian perspective. It warns that anything posted online could become publicly visible. It advises only posting content that Jesus would approve of and avoiding private information, provocative photos, or excessive details that could endanger privacy or safety. The document cautions that online predators use tactics like building trust and lowering barriers over time to manipulate victims and recommends never meeting online friends in person without parental permission. It provides tips for how to respond if one experiences cyberbullying and emphasizes bringing any suspicious online interactions to the attention of trusted adults.
Hiding last Friday night: How to clean up your social media presence Elliot Volkman
ย
In session one of three for Digital District and George Washington University's School of Media and Public Affairs, we discuss cleaning up your social media presence. In session two and three we show you how to slowly release the more important, professional areas of social media sites, and build out your personal brand.
This document provides guidelines for both online and offline safety. It recommends never revealing personal information online, giving out passwords, or meeting strangers alone who were met online. The document advises discussing appropriate pictures to post and using kind words online. Parents are encouraged to set clear rules, monitor technology use, and discuss mistakes without punishment to build trust. Basic safety tips include never responding to uncomfortable messages and always meeting online connections in public with an adult if meeting in person.
The document describes the contents of a "digital citizenship survival kit" which is meant to teach students important lessons about being safe and responsible online. The kit contains various items like a padlock, permanent marker, toothpaste, each intended to represent a different lesson. For example, the padlock reminds students to use strong passwords, while permanent marker shows that anything posted online can persist forever. The goal is to use tangible objects to help students understand abstract digital citizenship concepts.
A Social Media "What to do - and what not to do" for Middle School'ersGary Kayye
ย
A Social Media "What to do - and what not to do" for Teens
This is a short social media presentation I delivered at Culbreth Middle School in Chapel Hill, NC in April 2015. They were working on a Social Media Constitution for all the students to follow to guide proper social media usage. I presented this as a "do's and don'ts" of social media.
Cyberbullying involves using technology to harass or bully others and can lead to anxiety, depression, and even suicide. Some tips to prevent cyberbullying include pledging to stand against it, not using technology as a weapon to hurt others, and supporting those being bullied. Facebook offers features to control who can tag you, unfriend or block bullies, and report abusive content in order to help prevent cyberbullying.
This document summarizes Bret L. Simmons' personal branding workshop that took place on December 9-10, 2010 in Reno, Nevada. The agenda covered introducing personal branding philosophies and operating principles, new rules of marketing using online tools like Google profiles, LinkedIn, blogs, Twitter and Facebook. Simmons emphasized consistently contributing value through online content and conversations to build a personal brand and spread the word about one's expertise.
How to Stand against Cyberbullying on Facebooktechexpert2345
ย
Pledge to take a stand against Cyber-bullying, Beware of using technology as a weapon to hurt others, Try not to be a bystander of oneโs bullying, and much more.
This document discusses internet safety from a Christian perspective. It warns that anything posted online could become publicly visible. It advises only posting content that Jesus would approve of and avoiding private information, provocative photos, or excessive details that could endanger privacy or safety. The document cautions that online predators use tactics like building trust and lowering barriers over time to manipulate victims and recommends never meeting online friends in person without parental permission. It provides tips for how to respond if one experiences cyberbullying and emphasizes bringing any suspicious online interactions to the attention of trusted adults.
Hiding last Friday night: How to clean up your social media presence Elliot Volkman
ย
In session one of three for Digital District and George Washington University's School of Media and Public Affairs, we discuss cleaning up your social media presence. In session two and three we show you how to slowly release the more important, professional areas of social media sites, and build out your personal brand.
This document provides guidelines for both online and offline safety. It recommends never revealing personal information online, giving out passwords, or meeting strangers alone who were met online. The document advises discussing appropriate pictures to post and using kind words online. Parents are encouraged to set clear rules, monitor technology use, and discuss mistakes without punishment to build trust. Basic safety tips include never responding to uncomfortable messages and always meeting online connections in public with an adult if meeting in person.
The document describes the contents of a "digital citizenship survival kit" which is meant to teach students important lessons about being safe and responsible online. The kit contains various items like a padlock, permanent marker, toothpaste, each intended to represent a different lesson. For example, the padlock reminds students to use strong passwords, while permanent marker shows that anything posted online can persist forever. The goal is to use tangible objects to help students understand abstract digital citizenship concepts.
A Social Media "What to do - and what not to do" for Middle School'ersGary Kayye
ย
A Social Media "What to do - and what not to do" for Teens
This is a short social media presentation I delivered at Culbreth Middle School in Chapel Hill, NC in April 2015. They were working on a Social Media Constitution for all the students to follow to guide proper social media usage. I presented this as a "do's and don'ts" of social media.
This document discusses online safety tips for teens regarding social media and internet usage. It provides statistics on teen internet use and risks like online solicitation. Dangers discussed include sharing too much private information, exposure to inappropriate content, and interactions with online predators. The document recommends using privacy settings, being wary of strangers, keeping personal information private, and reporting any suspicious behavior or threats to a trusted adult.
This document provides information and guidance to teens on protecting their privacy and personal information when using social media and the internet. It discusses why online privacy is important, how personal information can be accessed and used, basic guidelines for safe social media use and disclosure of personal information, how to adjust privacy settings, security risks like passwords, phishing and spyware, and resources for further information. The overall message is that teens should be aware of privacy issues and risks when online and take steps to protect their privacy and personal information.
The document appears to be a quiz about social media usage trends related to gender. It asks multiple choice questions about which social network has more male than female users, which gender posts more frequently, interacts with brands more, and consumes more news through social media. The majority of the questions indicate that women engage with social media more than men across these different metrics.
This presentation was prepared for Centerville High School in Dayton, Ohio. It consists of what parents should know about their teens and social media.
Cyber safety: internet safety presentation for middle school studentsEllie Simons
ย
Middle schoolers should take steps to stay safe online for both current and future protection. They should avoid sharing personal information or passwords, use secure passwords that are different for each account, and make sure social media settings are private. It's important not to share photos or personal details with unknown people online as anything posted can remain visible forever. If someone is bullying or threatening online, save evidence and tell a trusted adult for help. Overall, be careful what you post or share since things online can have lasting consequences.
This document discusses teens' use of social media and parental concerns. It notes that approximately 75% of Canadians use social media, with some demographic differences. While 50% of parents worry about their child's social media use regarding things like privacy and interactions with strangers, research also shows that social media can have benefits for teens such as connecting with friends and collaborating on schoolwork. The document advocates that parents educate themselves about social media, communicate with their children about responsible use, and serve as role models for maintaining privacy online.
The document outlines 10 rules for children to follow when going online:
1) Do not share personal information without parental permission.
2) Tell parents if any information makes you uncomfortable.
3) Do not meet up with anyone met online without parental permission and supervision.
4) Do not send pictures or anything else without parental permission.
This document discusses social networking and social media, providing dos and don'ts for online socializing. It defines social networking as using websites and apps to interact with others. It advises that one should be their authentic self online but to only share information they don't mind being public, as anything posted can be found forever. Specific don'ts include posting private information, only accepting friend requests from people you know, and removing embarrassing photos. Privacy settings should be used and reviewed regularly to control what information is shared.
This document discusses the effects of social media on youth. It begins by defining social media and listing some popular social media tools like WhatsApp, Twitter, Facebook, and Google+. It then provides some statistics on social media usage and discusses how over half of India's population uses mobile platforms for social media. The document outlines some negative effects of social media like psychological disorders and distraction, as well as positive effects like communication and sharing information. It concludes by citing references used.
5 video apps that put in the director's chair.
Everyone is a filmmaker, and we all have the tools to make movies right in our pocket. Come to this session ready to create! You will have fun exploring some free, easy to use apps, and creating videos on your phone or tablet. Digital storytelling through movies can promote literacy in any subject area, but choosing the right tool is key. Tell your story and prepare to help you students tell theirs.
This document provides strategies for developing relationships and growing an on-campus program. It recommends starting with defining your why and understanding driving and restraining forces. The basics include focusing on relationships, starting small, being visible, and celebrating successes. Additional tips are to establish credibility, be consistent, name and brand the program with a simple, recognizable logo and name, and promote the work, team, early adopters, students, and yourself through blogging, meetings, emails and newsletters. Expanding influence involves starting with why, selling and promoting the vision, building relationships, sharing work, and expanding reach over time.
1) The document discusses how stop motion animation can help students better learn and demonstrate their understanding of concepts.
2) Stop motion animation is described as the technique of photographing objects and putting the photographs together as frames of a movie to give the objects the appearance of movement.
3) The document provides tips for creating stop motion animation projects, including using a studio, small movements between frames, and keeping the camera stationary. Students are challenged to create their own stop motion animation.
This document discusses copyright and fair use guidelines for educational use of copyrighted materials. It outlines the four factors of the fair use test: the purpose and character of the use, the nature of the work, the amount used, and the effect on the potential market. It provides specific guidelines for how much of different types of copyrighted works (words, music, illustrations) students can use under fair use. It advises educators to be cautious and avoid the "gray zone" by either creating their own materials, using Creative Commons works, or subscribing to media services when possible.
Slide show about the use of iPads in the classroom. Created for a 5 day technology integration workshop for ESL mentor teachers in Ipoh, Malaysia, May 1-5, 2014.
This document outlines the schedule and goals for an ESL Mentor Training workshop held from May 1-5, 2014 in Ipoh, Malaysia. The workshop aims to provide better understanding of effective technology integration, help participants begin developing an online professional reputation, and leave with lessons and resources that can be implemented. The schedule includes introductions, reviewing workshop goals, an overview of the learning management system Schoology, discussions of eportfolios and their purposes, examples of eportfolios, an assignment, and a session on professional blogging.
The Fish Bowl: Professional Development That WorksSteve Katz
ย
Presentation from EARCOS Leadership conference 2014.
A brief description of the professional development program the Korea International School EdTech Team created and implemented, and how it can be adapted to a variety of schools.
By Ben Summerton & Steve Katz
Ever thought about creating stop motion animations with your students? It is fun and easy to do. In this session we will cover some of the important aspects of creating these movies, and then create our own. Bring your computer, phone, or tablet, and some toys you would like to animate.
This is from lesson 2.2 of our ES tech boot camp. Instructions for setting up Blogger blogs. The entire boot camp can be found at http://kisonetoworld.blogspot.kr/p/the-boot-camp.html.
This art & technology project was completed in collaboration with high school art teacher Sara Arno for her two dimensional art class. We first collaborated on this project in 2013 with acrylic paintings, and a second time in 2014 with masks. For more information: http://bit.ly/arnokatz
The document provides instructions for setting up cameras, microphones, and apps like FaceTime, iMovie, GarageBand and SoundCloud on an Apple device. It also describes how to create and scan QR codes using the Qrafter and Doc Scan HD apps in order to share files and documents.
This document discusses online safety tips for teens regarding social media and internet usage. It provides statistics on teen internet use and risks like online solicitation. Dangers discussed include sharing too much private information, exposure to inappropriate content, and interactions with online predators. The document recommends using privacy settings, being wary of strangers, keeping personal information private, and reporting any suspicious behavior or threats to a trusted adult.
This document provides information and guidance to teens on protecting their privacy and personal information when using social media and the internet. It discusses why online privacy is important, how personal information can be accessed and used, basic guidelines for safe social media use and disclosure of personal information, how to adjust privacy settings, security risks like passwords, phishing and spyware, and resources for further information. The overall message is that teens should be aware of privacy issues and risks when online and take steps to protect their privacy and personal information.
The document appears to be a quiz about social media usage trends related to gender. It asks multiple choice questions about which social network has more male than female users, which gender posts more frequently, interacts with brands more, and consumes more news through social media. The majority of the questions indicate that women engage with social media more than men across these different metrics.
This presentation was prepared for Centerville High School in Dayton, Ohio. It consists of what parents should know about their teens and social media.
Cyber safety: internet safety presentation for middle school studentsEllie Simons
ย
Middle schoolers should take steps to stay safe online for both current and future protection. They should avoid sharing personal information or passwords, use secure passwords that are different for each account, and make sure social media settings are private. It's important not to share photos or personal details with unknown people online as anything posted can remain visible forever. If someone is bullying or threatening online, save evidence and tell a trusted adult for help. Overall, be careful what you post or share since things online can have lasting consequences.
This document discusses teens' use of social media and parental concerns. It notes that approximately 75% of Canadians use social media, with some demographic differences. While 50% of parents worry about their child's social media use regarding things like privacy and interactions with strangers, research also shows that social media can have benefits for teens such as connecting with friends and collaborating on schoolwork. The document advocates that parents educate themselves about social media, communicate with their children about responsible use, and serve as role models for maintaining privacy online.
The document outlines 10 rules for children to follow when going online:
1) Do not share personal information without parental permission.
2) Tell parents if any information makes you uncomfortable.
3) Do not meet up with anyone met online without parental permission and supervision.
4) Do not send pictures or anything else without parental permission.
This document discusses social networking and social media, providing dos and don'ts for online socializing. It defines social networking as using websites and apps to interact with others. It advises that one should be their authentic self online but to only share information they don't mind being public, as anything posted can be found forever. Specific don'ts include posting private information, only accepting friend requests from people you know, and removing embarrassing photos. Privacy settings should be used and reviewed regularly to control what information is shared.
This document discusses the effects of social media on youth. It begins by defining social media and listing some popular social media tools like WhatsApp, Twitter, Facebook, and Google+. It then provides some statistics on social media usage and discusses how over half of India's population uses mobile platforms for social media. The document outlines some negative effects of social media like psychological disorders and distraction, as well as positive effects like communication and sharing information. It concludes by citing references used.
5 video apps that put in the director's chair.
Everyone is a filmmaker, and we all have the tools to make movies right in our pocket. Come to this session ready to create! You will have fun exploring some free, easy to use apps, and creating videos on your phone or tablet. Digital storytelling through movies can promote literacy in any subject area, but choosing the right tool is key. Tell your story and prepare to help you students tell theirs.
This document provides strategies for developing relationships and growing an on-campus program. It recommends starting with defining your why and understanding driving and restraining forces. The basics include focusing on relationships, starting small, being visible, and celebrating successes. Additional tips are to establish credibility, be consistent, name and brand the program with a simple, recognizable logo and name, and promote the work, team, early adopters, students, and yourself through blogging, meetings, emails and newsletters. Expanding influence involves starting with why, selling and promoting the vision, building relationships, sharing work, and expanding reach over time.
1) The document discusses how stop motion animation can help students better learn and demonstrate their understanding of concepts.
2) Stop motion animation is described as the technique of photographing objects and putting the photographs together as frames of a movie to give the objects the appearance of movement.
3) The document provides tips for creating stop motion animation projects, including using a studio, small movements between frames, and keeping the camera stationary. Students are challenged to create their own stop motion animation.
This document discusses copyright and fair use guidelines for educational use of copyrighted materials. It outlines the four factors of the fair use test: the purpose and character of the use, the nature of the work, the amount used, and the effect on the potential market. It provides specific guidelines for how much of different types of copyrighted works (words, music, illustrations) students can use under fair use. It advises educators to be cautious and avoid the "gray zone" by either creating their own materials, using Creative Commons works, or subscribing to media services when possible.
Slide show about the use of iPads in the classroom. Created for a 5 day technology integration workshop for ESL mentor teachers in Ipoh, Malaysia, May 1-5, 2014.
This document outlines the schedule and goals for an ESL Mentor Training workshop held from May 1-5, 2014 in Ipoh, Malaysia. The workshop aims to provide better understanding of effective technology integration, help participants begin developing an online professional reputation, and leave with lessons and resources that can be implemented. The schedule includes introductions, reviewing workshop goals, an overview of the learning management system Schoology, discussions of eportfolios and their purposes, examples of eportfolios, an assignment, and a session on professional blogging.
The Fish Bowl: Professional Development That WorksSteve Katz
ย
Presentation from EARCOS Leadership conference 2014.
A brief description of the professional development program the Korea International School EdTech Team created and implemented, and how it can be adapted to a variety of schools.
By Ben Summerton & Steve Katz
Ever thought about creating stop motion animations with your students? It is fun and easy to do. In this session we will cover some of the important aspects of creating these movies, and then create our own. Bring your computer, phone, or tablet, and some toys you would like to animate.
This is from lesson 2.2 of our ES tech boot camp. Instructions for setting up Blogger blogs. The entire boot camp can be found at http://kisonetoworld.blogspot.kr/p/the-boot-camp.html.
This art & technology project was completed in collaboration with high school art teacher Sara Arno for her two dimensional art class. We first collaborated on this project in 2013 with acrylic paintings, and a second time in 2014 with masks. For more information: http://bit.ly/arnokatz
The document provides instructions for setting up cameras, microphones, and apps like FaceTime, iMovie, GarageBand and SoundCloud on an Apple device. It also describes how to create and scan QR codes using the Qrafter and Doc Scan HD apps in order to share files and documents.
The document discusses the flipped classroom model of instruction. In a flipped classroom, traditional homework is done in class and lecture content is delivered through videos for students to watch at home. This allows class time to be used for active learning activities like discussions and problem-solving. The flipped model has evolved from being used for absent students to a full redesign of classroom activities that places the teacher in more of a guiding role. Tools like YouTube and video editing software allow teachers to easily create and share video lessons for students.
This document provides instructions for preparing a Mac computer for reimaging without losing personal files or customizations. It involves cleaning up files, backing up data using Time Machine, saving notes, bookmarks, fonts, widgets and other applications. After reimaging, the instructions guide setting up a new user account, connecting to WiFi, updating software, restoring preferences and files from backup. The process takes approximately 3-4 hours to complete.
Professional Development at Korea International SchoolSteve Katz
ย
This is the resource that I referred to during the professional development panel for administrators at the KORCOS conference in Songdo, Korea, March 9, 2012.
The document provides practical ideas for teaching in a 1:1 classroom setting where each student has a laptop. It discusses using technology as a tool to drive the curriculum through project-based learning and authentic assessments. The teacher should incorporate communication, collaboration, creativity, and community as outlined by ISTE standards. Clear expectations and lesson planning are important to avoid excuses from students about technology issues. Practical tips include having laptops charged and using classroom management software.
The document provides an introduction to podcasting for teachers and outlines how to implement student podcasting projects. It defines podcasting as an audio or video show that is regularly distributed. Benefits of student podcasting include deeper learning of curriculum and developing language and critical thinking skills. The document reviews necessary hardware, audio and video tools, production tips, hosting options, and example student and educational podcasts. It provides objectives and steps for teachers to get started with podcasting.
My struggles, successes, and recommendations
for teaching in a paperless classroom. See the updated presentation: http://prezi.com/zmckfolwulxg/?utm_campaign=share&utm_medium=copy&rc=ex0share
This document provides an overview of wound healing, its functions, stages, mechanisms, factors affecting it, and complications.
A wound is a break in the integrity of the skin or tissues, which may be associated with disruption of the structure and function.
Healing is the bodyโs response to injury in an attempt to restore normal structure and functions.
Healing can occur in two ways: Regeneration and Repair
There are 4 phases of wound healing: hemostasis, inflammation, proliferation, and remodeling. This document also describes the mechanism of wound healing. Factors that affect healing include infection, uncontrolled diabetes, poor nutrition, age, anemia, the presence of foreign bodies, etc.
Complications of wound healing like infection, hyperpigmentation of scar, contractures, and keloid formation.
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxEduSkills OECD
ย
Ivรกn Bornacelly, Policy Analyst at the OECD Centre for Skills, OECD, presents at the webinar 'Tackling job market gaps with a skills-first approach' on 12 June 2024
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.pptHenry Hollis
ย
The History of NZ 1870-1900.
Making of a Nation.
From the NZ Wars to Liberals,
Richard Seddon, George Grey,
Social Laboratory, New Zealand,
Confiscations, Kotahitanga, Kingitanga, Parliament, Suffrage, Repudiation, Economic Change, Agriculture, Gold Mining, Timber, Flax, Sheep, Dairying,
Temple of Asclepius in Thrace. Excavation resultsKrassimira Luka
ย
The temple and the sanctuary around were dedicated to Asklepios Zmidrenus. This name has been known since 1875 when an inscription dedicated to him was discovered in Rome. The inscription is dated in 227 AD and was left by soldiers originating from the city of Philippopolis (modern Plovdiv).
A Visual Guide to 1 Samuel | A Tale of Two HeartsSteve Thomason
ย
These slides walk through the story of 1 Samuel. Samuel is the last judge of Israel. The people reject God and want a king. Saul is anointed as the first king, but he is not a good king. David, the shepherd boy is anointed and Saul is envious of him. David shows honor while Saul continues to self destruct.
2. General Guidelines Keep your identity secret Donโt talk to strangers Only reply to emails of people you know Donโt meet online friends in real life Protect your passwords Donโt post private identifying information Tell somebody
3. Tell Someone Your parents, a teacher, a trusted adult If youโre being bullied If someone makes you uncomfortable If someone you met online wants to meet http://www.flickr.com/photos/wiltscat/940121531/sizes/m/