Many people think that cyber bullying isn’t a big deal. But as stated in the article Stop Cyber bullying. “In some cases, if hacking or password and identity theft is involved, can be a serious criminal matter under state and federal law.They think this just because they have never been cyber bullied in their life. “Cyber Bullying” is when a person is being harassed by someone else on the internet or on any other type of technology. Every day in every state there are people that are cyber bullied. Cyber bullying is a very big crime now because of cases of teens committing suicide just because they received a cruel message from people. People Cyber bully because they are scared to confront the person face to face and online there are many people that can see what you put about someone. These social networking sites such as Facebook, Twitter, and Myspace are easier ways to put a lot of people on blast about their personal information.
Tuesday, December 20, 2011
Wednesday, December 14, 2011
Grades
Algebra Block 1- I have a 64% in this class.
Home Room 2nd Quarter- I have a 87% in this class.
Language Arts Block 1- I have a 82% on this class.
Home Room 2nd Quarter- I have a 87% in this class.
Language Arts Block 1- I have a 82% on this class.
Monday, December 12, 2011
Cyber Safety Glogster (Cyberbullying)
What topic will you focus your final projects on?
A: I will focus on the cyberbullying for my final project.
Cyber Safety- Cyber Safety means being safe on the internet which means don't put anything perosnal on the internet that can put you in danger of a predator.
Cyberbullying- Involves the use of information and communication technologies to support, deliberate, repeated, and hostile behavior.
3 Facts:
-Many people are bullied each year on the internet than in reality.
-There have been suicide cases that involove cyberbullying to the victim.
-Many teens and kids are at risk by going online and giving out information abotut themsleves on the internet.
People need to know that gicing out information on the internet can put you in risk to cyberbullying because many people can see what you put. Also, many people bully online because they can say whatever they want instead as if they were face to face.Teens and kids need to be safe on the internet and know what they are doing.

A: I will focus on the cyberbullying for my final project.
Cyber Safety- Cyber Safety means being safe on the internet which means don't put anything perosnal on the internet that can put you in danger of a predator.
Cyberbullying- Involves the use of information and communication technologies to support, deliberate, repeated, and hostile behavior.
3 Facts:
-Many people are bullied each year on the internet than in reality.
-There have been suicide cases that involove cyberbullying to the victim.
-Many teens and kids are at risk by going online and giving out information abotut themsleves on the internet.
People need to know that gicing out information on the internet can put you in risk to cyberbullying because many people can see what you put. Also, many people bully online because they can say whatever they want instead as if they were face to face.Teens and kids need to be safe on the internet and know what they are doing.
Friday, December 9, 2011
1a. Define paraphrasing.
A:To write something in your own words.
1b. What is one reason parahrasing is a valuable skill?
A: It's a valuable skill because it can help you with assignments they assign you at school which says to write a summary in your own words.
TIP 1 – Beware of TMI: the five things you should never share
A: People need to learn that they can't keep giving out there information such as social security number, birth date, home address, or phone number to a random person.
TIP 2 – Customize privacy options
Social networking sites such as myspace, tumblr, and facebook gives the users their own control for their own privacy settings to make sure no one can find out their information.
TIP 3 – Limit work history details on LinkedIn
A: Don't put up too much information about yourself if you are looking for a job and you want recruiters to hire you, there can be internet thieves that can get your information and use it for other purposes.
TIP 4 - Don't trust, just verify
A: Most people steal other peoples private information because they might want to do a prank on them or just do it for fun.
TIP 5 – Control comments
A: People can impersonate other people on these commenting systems because you really don't know who the person is.
TIP 6 – Avoid accidentally sharing personal details
A: You don't want to let details slip about yourself an example is that facebook has a newsfeed which says "what is on your mind?" Anyone can put anything on there and many people can see what they post up in the newsfeed.
TIP 7 – Search yourself
A: People should search up their name on google because if your name shows up in another loction, then you know that there is someone else using your identity at another location.
TIP 8 – Don't violate your company's social networking policies
A: You should becareful of what you put up on social networking site. Many jobs can find out about a persons background information just by looking at their profile. You want to make sure there is no inappropriate information on there.
TIP 9 – Learn how sites can use your information
A: People say that sites make money by advertising you which means they take your personal information and advertise it to other people in your society.
TIP 10 – Forget the popularity contest
A: Mose people think they are a "winner" when they have more friends than you. But study shows that people who have a lot of friends, they are most likely all strangers that the person doesn't even talk to.
TIP 11 – Create a smaller social network
A: It can be easier if there is a smaller social networking site because on a big site, you can get lost and put up a lot of information about yourself and not know what the big sites are going to do with it.
TIP 12 – Setup an OpenID account
A: This kind of site will help other people know that this is your real identity and that it is not anyone else trying to steal your own identity.
A:To write something in your own words.
1b. What is one reason parahrasing is a valuable skill?
A: It's a valuable skill because it can help you with assignments they assign you at school which says to write a summary in your own words.
TIP 1 – Beware of TMI: the five things you should never share
A: People need to learn that they can't keep giving out there information such as social security number, birth date, home address, or phone number to a random person.
TIP 2 – Customize privacy options
Social networking sites such as myspace, tumblr, and facebook gives the users their own control for their own privacy settings to make sure no one can find out their information.
TIP 3 – Limit work history details on LinkedIn
A: Don't put up too much information about yourself if you are looking for a job and you want recruiters to hire you, there can be internet thieves that can get your information and use it for other purposes.
TIP 4 - Don't trust, just verify
A: Most people steal other peoples private information because they might want to do a prank on them or just do it for fun.
TIP 5 – Control comments
A: People can impersonate other people on these commenting systems because you really don't know who the person is.
TIP 6 – Avoid accidentally sharing personal details
A: You don't want to let details slip about yourself an example is that facebook has a newsfeed which says "what is on your mind?" Anyone can put anything on there and many people can see what they post up in the newsfeed.
TIP 7 – Search yourself
A: People should search up their name on google because if your name shows up in another loction, then you know that there is someone else using your identity at another location.
TIP 8 – Don't violate your company's social networking policies
A: You should becareful of what you put up on social networking site. Many jobs can find out about a persons background information just by looking at their profile. You want to make sure there is no inappropriate information on there.
TIP 9 – Learn how sites can use your information
A: People say that sites make money by advertising you which means they take your personal information and advertise it to other people in your society.
TIP 10 – Forget the popularity contest
A: Mose people think they are a "winner" when they have more friends than you. But study shows that people who have a lot of friends, they are most likely all strangers that the person doesn't even talk to.
TIP 11 – Create a smaller social network
A: It can be easier if there is a smaller social networking site because on a big site, you can get lost and put up a lot of information about yourself and not know what the big sites are going to do with it.
TIP 12 – Setup an OpenID account
A: This kind of site will help other people know that this is your real identity and that it is not anyone else trying to steal your own identity.
Tuesday, December 6, 2011
Social Networks
1a. What are the best features of social networking sites such as MySpace and Facebook?
1)You can contact long distance family members that you haven't talked to in a while.
2)Meet new friends to conversate with if your a friendly person.
3)Flirt with girls that are around your area to meet up with them soon.
1b. What are some of the problems teens can encounter on social networking sites?
1)They can encounter bullying .
2)They can encounter predators that are looking for young teens and trying to get information out of them.
3)They can get hacked by other people & the people can post up very inappropriate things on their social network site.
1)You can contact long distance family members that you haven't talked to in a while.
2)Meet new friends to conversate with if your a friendly person.
3)Flirt with girls that are around your area to meet up with them soon.
1b. What are some of the problems teens can encounter on social networking sites?
1)They can encounter bullying .
2)They can encounter predators that are looking for young teens and trying to get information out of them.
3)They can get hacked by other people & the people can post up very inappropriate things on their social network site.
Friday, December 2, 2011
Review the Key Vocabulary
1. In what ways is the person you identified ethical?
A: The person i know is ethical because they are always telling me to go to church with him and to always pray.
2. What are examples of ways that people behave unethically in their dealings with others?
A: Some examples are that they yell at them, use proifanity towards that person, or physically hurt somebody.
3. What are examples of ways that people behave unethically in the community?
A: They commit crimes, try to ruin other peoples way of doing things.
4. What are examples of ways that people behave unethically online?
A: They spread rumors online, make fun of other people, or try to hack in other people accounts for anything.
Q1: Was it appropriate for YourPalAl to post personal information about Matt on Jeff’s profile? Are there any potential benefits or harms in having Matt’s story shared online?
A: No it was not appropriate because it is private information that Matt doesn't want to share. Yes there is some harms because people can spread his personal information around in the quickness.
Q2: When you see Matt at school tomorrow, will you treat him any differently? What effect might seeing his personal information online have on how you think about or treat himoffline (i.e., face-to-face)?
A: No i wouldn't because i know that would be disrespectful and i respect people. There really is no effect because i would still see him the same way and not treat him differently just because of some personal information.
Q3: Are there any other ways that YourPalAl could have used digital technology in trying to help his friend Matt?
A: He could of not put up Matt's personal info and put something else about him.
Q4: What would you have done if you were in YourPalAl’s place? What would you do if youwere Jeff? How would you react if you were Matt?
A: I would of not put up Matts personal information. I would delete the information before it spreads and i would confront yourpalAL's. I wouldn't care because i cam careless about anyones opinion about me.
Q1: Why do you think Lisa may have chosen a new “goth” profile picture? Is there any harmin her presenting a different identity online?
A: She probably chose it because she didn't want anyone to know about her real identity. Yes there is a harm because many people can be mistaked about her identity online, and her identity in reality.
Q2: Imagine that Lisa’s online friends had never met her face-to-face, and that once they did they discovered she doesn’t actually dress goth. How do you think they would react?
A: They would probably call her a poser because she is really not what she shows online.
Q3: Why might RosyRosa and The trouble w/Ty be reacting negatively to their friend’s new picture? Is it right for them to respond the way they did?
A: They probably reacted like that because she's not really that person in reality. No it is not because that is their friend and they should treat her with respect no matter what.
Q4: What would you have done if you had seen a profile picture like Lisa’s, that didn’t seemreal? How would you react to RosyRosa and The trouble w/Ty’s postings if you were Lisa?
A: I wouldn't care because i don't judge people like that. I would just ignore it and pretend like it never happened cause no ones words can hurt me.
A: The person i know is ethical because they are always telling me to go to church with him and to always pray.
2. What are examples of ways that people behave unethically in their dealings with others?
A: Some examples are that they yell at them, use proifanity towards that person, or physically hurt somebody.
3. What are examples of ways that people behave unethically in the community?
A: They commit crimes, try to ruin other peoples way of doing things.
4. What are examples of ways that people behave unethically online?
A: They spread rumors online, make fun of other people, or try to hack in other people accounts for anything.
Q1: Was it appropriate for YourPalAl to post personal information about Matt on Jeff’s profile? Are there any potential benefits or harms in having Matt’s story shared online?
A: No it was not appropriate because it is private information that Matt doesn't want to share. Yes there is some harms because people can spread his personal information around in the quickness.
Q2: When you see Matt at school tomorrow, will you treat him any differently? What effect might seeing his personal information online have on how you think about or treat himoffline (i.e., face-to-face)?
A: No i wouldn't because i know that would be disrespectful and i respect people. There really is no effect because i would still see him the same way and not treat him differently just because of some personal information.
Q3: Are there any other ways that YourPalAl could have used digital technology in trying to help his friend Matt?
A: He could of not put up Matt's personal info and put something else about him.
Q4: What would you have done if you were in YourPalAl’s place? What would you do if youwere Jeff? How would you react if you were Matt?
A: I would of not put up Matts personal information. I would delete the information before it spreads and i would confront yourpalAL's. I wouldn't care because i cam careless about anyones opinion about me.
Q1: Why do you think Lisa may have chosen a new “goth” profile picture? Is there any harmin her presenting a different identity online?
A: She probably chose it because she didn't want anyone to know about her real identity. Yes there is a harm because many people can be mistaked about her identity online, and her identity in reality.
Q2: Imagine that Lisa’s online friends had never met her face-to-face, and that once they did they discovered she doesn’t actually dress goth. How do you think they would react?
A: They would probably call her a poser because she is really not what she shows online.
Q3: Why might RosyRosa and The trouble w/Ty be reacting negatively to their friend’s new picture? Is it right for them to respond the way they did?
A: They probably reacted like that because she's not really that person in reality. No it is not because that is their friend and they should treat her with respect no matter what.
Q4: What would you have done if you had seen a profile picture like Lisa’s, that didn’t seemreal? How would you react to RosyRosa and The trouble w/Ty’s postings if you were Lisa?
A: I wouldn't care because i don't judge people like that. I would just ignore it and pretend like it never happened cause no ones words can hurt me.
Thursday, December 1, 2011
Social Networks - Public Service Annoucement
The PSA was about people who put up a picture about a girl on the bulletin board at school. I learned that things like this can spread around quickly like a virus. This Is why you should never send pictures to other people. No matter what the person says to try to convince you. People need to learn that these things can effect the way you live.
The target of this PSA Is a young girl who put up a photo about herself online. Yes, this Is an effective message to all teens who are on the internet a lot. Yes it does connect me In real ways because this happens In reality and I saw it happen online. No i don't know anyone with similar experience right now, but I have known people with similar experiences in the past. They delt with It by just ignoring everything and I even helped them out with the situation.
The target of this PSA Is a young girl who put up a photo about herself online. Yes, this Is an effective message to all teens who are on the internet a lot. Yes it does connect me In real ways because this happens In reality and I saw it happen online. No i don't know anyone with similar experience right now, but I have known people with similar experiences in the past. They delt with It by just ignoring everything and I even helped them out with the situation.
Wednesday, November 30, 2011
1. What are examples of self-disclosure?
1. What are examples of self-disclosure?
A: Some examples of self-disclosure are putting up your info, sharing private things about your slef with other people, making rumors about other peoples private info.
2. How does self-disclosure deepen a relationship?
It deepens a relationship because both genders share real private information and even give them passwords to private sites such as bank account, phone account, or a facebook.
3. Are there types of self-disclosure that people should be careful about sharing with others?
A: Yes there is because peple can spread rumors if you talk about a self-disclosure like about your family, yourself, or other people.
4. How might self-disclosing using digital technologies be even more risky than face-to-face?
A: It's more risky because millions of people can see what you put online, and it could go around more with just a click of a button.
1. Why did Ally share the nude picture of herself with her ex-boyfriend?
A: She sent the picture because she felt want wanted by him if he were to ask her for a favor like the nude picture, she also felt vulnerable without him.
2. Why do you think Ally’s ex-boyfriend forwarded the picture to others?
A: He probably sent it because he had no love for her no more, and if they couldn't be togther then he would humiliate her.
3. How might Ally have felt after she found out the photo was sent around?
A: She probably felt even more vulnerable and very stupid because she sent it to her ex boyfriend.
4. Looking back on the situation, Ally has a different perspective on what happened. What did she later realize?
A: She realized that sexting can get you in very trouble with the law, or the sext message can get passed around to others.
5. Name at least three consequences that could happen if you sext someone...
1: It can get passed around like a rumor but faster.
2: You can get in trouble by the law since it is now prohibited in some state.
3: People can bully you for sexting.
In the examples discussed, boys pressure girls to sext, but statistics show that boys sext girls too. Do you think boys and girls who sext are treated the same way?
A: No, i think the boys get treated agressive because they are the ones who are always pressuring the girls into sexting.
A: Some examples of self-disclosure are putting up your info, sharing private things about your slef with other people, making rumors about other peoples private info.
2. How does self-disclosure deepen a relationship?
It deepens a relationship because both genders share real private information and even give them passwords to private sites such as bank account, phone account, or a facebook.
3. Are there types of self-disclosure that people should be careful about sharing with others?
A: Yes there is because peple can spread rumors if you talk about a self-disclosure like about your family, yourself, or other people.
4. How might self-disclosing using digital technologies be even more risky than face-to-face?
A: It's more risky because millions of people can see what you put online, and it could go around more with just a click of a button.
1. Why did Ally share the nude picture of herself with her ex-boyfriend?
A: She sent the picture because she felt want wanted by him if he were to ask her for a favor like the nude picture, she also felt vulnerable without him.
2. Why do you think Ally’s ex-boyfriend forwarded the picture to others?
A: He probably sent it because he had no love for her no more, and if they couldn't be togther then he would humiliate her.
3. How might Ally have felt after she found out the photo was sent around?
A: She probably felt even more vulnerable and very stupid because she sent it to her ex boyfriend.
4. Looking back on the situation, Ally has a different perspective on what happened. What did she later realize?
A: She realized that sexting can get you in very trouble with the law, or the sext message can get passed around to others.
5. Name at least three consequences that could happen if you sext someone...
1: It can get passed around like a rumor but faster.
2: You can get in trouble by the law since it is now prohibited in some state.
3: People can bully you for sexting.
In the examples discussed, boys pressure girls to sext, but statistics show that boys sext girls too. Do you think boys and girls who sext are treated the same way?
A: No, i think the boys get treated agressive because they are the ones who are always pressuring the girls into sexting.
Tuesday, November 29, 2011
Inappropriate Content -- Acceptable Use Policy (AUP)
1a. Do I recognize when there is an issue of inappropriate use of technology? Why or why not?
A: Yes i do recognize it because it stands out on the internet and someone always makes it obvious.
1b. Have I considered the appropriateness of my actions? Why or why not?
A: Yes i have considered actually, but i think that my actions are very appropriate to this society.
1c. Can I differentiate which of my actions are considered misuse or abuse? Why or why not?
A: Yes i can because the actions are coming from myself and i should be knowing what i am doing.But i would know if i misused or abused because then i am the one displaying these inappropriate actions.
1d. Am I aware of the implications of my actions when using technology? Why or why not?
A: Yes i am aware because i know that i am appropriate when it comes to using technology.
3a. What types of technology use are considered appropriate or inappropriate in school?
A: Students that disclose, use, distribute, publish, e-mail, hyperlink, or make available information about themselves is in appropriate. It is appropriate for students to use technology for school resources.
3b. Why are they considered inappropriate?
A: They are considered inappropriate because other students can be on the same computer and see all the information that this person made on that same computer.
A: Yes i do recognize it because it stands out on the internet and someone always makes it obvious.
1b. Have I considered the appropriateness of my actions? Why or why not?
A: Yes i have considered actually, but i think that my actions are very appropriate to this society.
1c. Can I differentiate which of my actions are considered misuse or abuse? Why or why not?
A: Yes i can because the actions are coming from myself and i should be knowing what i am doing.But i would know if i misused or abused because then i am the one displaying these inappropriate actions.
1d. Am I aware of the implications of my actions when using technology? Why or why not?
A: Yes i am aware because i know that i am appropriate when it comes to using technology.
3a. What types of technology use are considered appropriate or inappropriate in school?
A: Students that disclose, use, distribute, publish, e-mail, hyperlink, or make available information about themselves is in appropriate. It is appropriate for students to use technology for school resources.
3b. Why are they considered inappropriate?
A: They are considered inappropriate because other students can be on the same computer and see all the information that this person made on that same computer.
Monday, November 28, 2011
Inappropriate Content - Freedom of Speech
1a. What do you know about Freedom of Speech?
A: I know that freedom of speech is when you have the right to say what you want to say to anyone or about something.
1b. Why is it do you think that hate isn't censored on the internet?
A: I think that it is not censored because it's only on the internet and not onlinen so people think that it's not all bad.
2a. What images or thoughts come to your mind when you see links to the Ku Klux Klan?
A: I think of them as a corrupt group who torcher anyone that is not their ethnicity. They are a menace to this society.
2b. "What are your thoughts about this web site now?
A: I still see this as a menace to society due to the viloence they potrayed back then.
2c. What are some possible reasons why the site might offer a disclaimer?
A: A reason is that because they don't want people to see them as a threat to other ethnicity's.
2d. What does "propaganda" mean? How does the term "propaganda" apply to the example of the Ku Klux Klan web site?
A: Propaganda is information which is false or which emphasizes just one part of a situation. It applys to them because the Ku Klux Klan sees themsleves as the superior white race.
2e. How might standing up for one's rights lead to violence in this case? What are some key words that might alert you to this?
A: It might lead to violence because other ethinicity's think of themsleves as a better ethnic race. Some key words are like Wetbag, redneck.
2f. Do you believe, at this point, that this might be a dangerous hate site? Why or why not?
A: In my point of view it really doesn't seem like one, but you never know. It could be one so i would stay i out it if i were you.
A: I know that freedom of speech is when you have the right to say what you want to say to anyone or about something.
1b. Why is it do you think that hate isn't censored on the internet?
A: I think that it is not censored because it's only on the internet and not onlinen so people think that it's not all bad.
2a. What images or thoughts come to your mind when you see links to the Ku Klux Klan?
A: I think of them as a corrupt group who torcher anyone that is not their ethnicity. They are a menace to this society.
2b. "What are your thoughts about this web site now?
A: I still see this as a menace to society due to the viloence they potrayed back then.
2c. What are some possible reasons why the site might offer a disclaimer?
A: A reason is that because they don't want people to see them as a threat to other ethnicity's.
2d. What does "propaganda" mean? How does the term "propaganda" apply to the example of the Ku Klux Klan web site?
A: Propaganda is information which is false or which emphasizes just one part of a situation. It applys to them because the Ku Klux Klan sees themsleves as the superior white race.
2e. How might standing up for one's rights lead to violence in this case? What are some key words that might alert you to this?
A: It might lead to violence because other ethinicity's think of themsleves as a better ethnic race. Some key words are like Wetbag, redneck.
2f. Do you believe, at this point, that this might be a dangerous hate site? Why or why not?
A: In my point of view it really doesn't seem like one, but you never know. It could be one so i would stay i out it if i were you.
Tuesday, November 22, 2011
Breaking Down Hate Speech
1. What are some general ways that hate speech can be used in the offline world?
A: Some ways are like making rumors, calling you names, and discriminating your race in many ways. It could lead to worst things if the hate speech is very cruel. They can also do physical contact with the person.
2. What are some general ways that hate speech might be used online?
A: Some ways are that they can put up pictures of you edited to make fun of you. They could send cruel messages to the person. They can put up newsfeed about the person.
A: Some ways are like making rumors, calling you names, and discriminating your race in many ways. It could lead to worst things if the hate speech is very cruel. They can also do physical contact with the person.
2. What are some general ways that hate speech might be used online?
A: Some ways are that they can put up pictures of you edited to make fun of you. They could send cruel messages to the person. They can put up newsfeed about the person.
Friday, November 18, 2011
Piracy & Plagiarism
I would respond by telling him lets just spend all night doing it again. I wouldn't want to plagerize from another article because i feel like i didn't really try. I would at least try to get as much as i can done and just try to convince the teacher what happened.
1. How did Ms. Prestebak discover that the high school student had taken his paper off the Internet?
A: She looked at the first 5 words and put it on search on the internet, then the website came up with the same exact words as the students paper.
2. How has the temptation to cheat been increased by access to the Internet?
A: It's been increased because many students could just look up what their researching about on the internet.
3. What happened at the University of Virginia with regards to this topic?
A: 122 students were being investigated into plagiarism to their introductory physics course.
4. What did Donald McCabe’s survey reveal?
A: He found that high school's seem to present a far larger problem when it comes to plagiarism.
5. According to Cathy Aubrecht, what is a sign that a student has plagiarized?
A: She says a sign is when a student does not do any work in class and does not show no effort with anything. But when it comes to big reports, they start to plagerize to pass it.
6. What are some of the consequences for plagiarism?
A: Students get suspended or can even get expelled.
7. What are some resources that schools can use to find out if students are plagiarizing materials?
A: Some resources is that the teachers can get surveys on the computers to make sure students are not plagerizing on any of their work.
1. How did Ms. Prestebak discover that the high school student had taken his paper off the Internet?
A: She looked at the first 5 words and put it on search on the internet, then the website came up with the same exact words as the students paper.
2. How has the temptation to cheat been increased by access to the Internet?
A: It's been increased because many students could just look up what their researching about on the internet.
3. What happened at the University of Virginia with regards to this topic?
A: 122 students were being investigated into plagiarism to their introductory physics course.
4. What did Donald McCabe’s survey reveal?
A: He found that high school's seem to present a far larger problem when it comes to plagiarism.
5. According to Cathy Aubrecht, what is a sign that a student has plagiarized?
A: She says a sign is when a student does not do any work in class and does not show no effort with anything. But when it comes to big reports, they start to plagerize to pass it.
6. What are some of the consequences for plagiarism?
A: Students get suspended or can even get expelled.
7. What are some resources that schools can use to find out if students are plagiarizing materials?
A: Some resources is that the teachers can get surveys on the computers to make sure students are not plagerizing on any of their work.
Thursday, November 17, 2011
A Creator's Responsibilities
1. Can you remember when you last copied, downloaded, or shared some type of creative work? What was the creative work?
A: The last time i copied a type of creative work is last week when i was doing a project on something in drug class.
2. Can you think of a time when you used someone else’s work in something you made?
A: Last time was when i had to do a a group project at my old school iris, i used my friends work for my presentation.
1. Can you think of an example of piracy or plagiarism?
A: An example of piracy is illegal movies being sold in Mexico.
2. What are Henry’s rights as a creator?
A:His rights are that he is in charge of making sure that no one steals his ideas or does a plagiarism.
3. What are Henry’s responsibilities in using other people’s creative work?
A: Henry's responsibilities is to ask consent from the people who made up their creative work so they don't label it as pirating.
4. Henry says that pirating material is stealing, no matter how it’s done. What are examples of pirating? Why should you avoid it?
A: Examples pf pirating is when someone steals someone elses creative work and makes a profit out of it. We should avoid this because this is considered a crime
5. Henry likes to make mash-ups and remixes and put them online. What does he need to do to make this “fair use”?
A: He needs to ask consent of the people who made the other mixes so they don't blame him for pirating.
A: The last time i copied a type of creative work is last week when i was doing a project on something in drug class.
2. Can you think of a time when you used someone else’s work in something you made?
A: Last time was when i had to do a a group project at my old school iris, i used my friends work for my presentation.
1. Can you think of an example of piracy or plagiarism?
A: An example of piracy is illegal movies being sold in Mexico.
2. What are Henry’s rights as a creator?
A:His rights are that he is in charge of making sure that no one steals his ideas or does a plagiarism.
3. What are Henry’s responsibilities in using other people’s creative work?
A: Henry's responsibilities is to ask consent from the people who made up their creative work so they don't label it as pirating.
4. Henry says that pirating material is stealing, no matter how it’s done. What are examples of pirating? Why should you avoid it?
A: Examples pf pirating is when someone steals someone elses creative work and makes a profit out of it. We should avoid this because this is considered a crime
5. Henry likes to make mash-ups and remixes and put them online. What does he need to do to make this “fair use”?
A: He needs to ask consent of the people who made the other mixes so they don't blame him for pirating.
Wednesday, November 16, 2011
Copyrights and Wrongs
1. What do you think we mean when we talk about someone’s creative work?
A: I think we mean that creative work is someone who does major work very creative.
2. Have you ever used creative work you found online – for example, a photo or a poem – for personal use?
A: Yes i have because it helps me by giving me more information about something.
3. When you use creative work you find online, what considerations do you make about who made it, if any?
A: I say that i made it up so that i can look like a genius.
1. What are the ways you can be respectful of people’s creative work?
A: You can be respectful by giving the person nice compliments about their creative work & just making them feel good about it.
2. How do you think you would you feel if someone used your creative work?
A: I would be angry because i made up the creative work and i would want credit for it.
Would it make a difference whether they did the following:
• Asked your permission to use it?
A: Yes because they asked for my consent.
• Gave you credit as the creator?
A: Yes because i am the one getting credit for it.
• Changed the picture or added a caption without asking you?
A: Yes because they didn't ask for my consent which would make me furious.
A: I think we mean that creative work is someone who does major work very creative.
2. Have you ever used creative work you found online – for example, a photo or a poem – for personal use?
A: Yes i have because it helps me by giving me more information about something.
3. When you use creative work you find online, what considerations do you make about who made it, if any?
A: I say that i made it up so that i can look like a genius.
1. What are the ways you can be respectful of people’s creative work?
A: You can be respectful by giving the person nice compliments about their creative work & just making them feel good about it.
2. How do you think you would you feel if someone used your creative work?
A: I would be angry because i made up the creative work and i would want credit for it.
Would it make a difference whether they did the following:
• Asked your permission to use it?
A: Yes because they asked for my consent.
• Gave you credit as the creator?
A: Yes because i am the one getting credit for it.
• Changed the picture or added a caption without asking you?
A: Yes because they didn't ask for my consent which would make me furious.
Wednesday, November 9, 2011
Cyber Predators
Idea #1- Ford Greene, chief of information systems & technology at Rochester School District In NY, states "Don't put computers in the corner where the teachers can have full supervision of what their doing." She alosy states "besides, you want the technology to be a part of learning to the students as well."
Idea #2- Nancy Willard, executive director for the Center for Safe and Responsible Internet Use in Portland, Ore says "That schools should educate all staff on how to respond when a student does a report conecern." She also states that students become embarassed.
Idea #3- `
Idea #2- Nancy Willard, executive director for the Center for Safe and Responsible Internet Use in Portland, Ore says "That schools should educate all staff on how to respond when a student does a report conecern." She also states that students become embarassed.
Idea #3- `
Tuesday, November 8, 2011
Amy's Story
1. Why did Amy start talking to the man online?
A: Because the man was saying that she would
2. Where did Amy first “meet” the man?
A:On a online chat line.
3. How long did Amy talk to the man online before meeting him in person?
A: She was talking to him for 2 weeks.
4. Amy knew how old the man was. Why did she keep talking to him?
A: Because she said that she developed feelings for the man even tho she didn't meet him yet.
5. Had the man ever talked other girls into meeting with him in person?
A:she was talking to other girls because they were telling Amy.
6. Why is Amy still worried?
A: She is worried because the guy is soon going to out of prison and might be calling her again.
7. Why does Amy encourage other teens to talk to their parents about what's going on even though they might get in trouble?
A: Amy encourages teens because their parents could help stop whatever is happening before it gets even worse.
1. Why aren't many teens concerned about giving out personal information online?
A: They aren't concerned because they don't think nothing will happen just because their online and not face to face.
2. At what point do you think Amy regretted sharing her personal information?
A: When the man kept on calling her and going to her house.
3. What were the consequences of sharing her personal information online?
A: The consequnces were that the man kept on calling her, messaging her online, and he kept on going to her house.
4. If your friend confides in you that he or she is thinking about meeting in person with anyone he or she first “met” online, what would you tell him or her?
A: I would tell them that they are full of stupidity and should think about it twice because it can be dangerous.
A: Because the man was saying that she would
2. Where did Amy first “meet” the man?
A:On a online chat line.
3. How long did Amy talk to the man online before meeting him in person?
A: She was talking to him for 2 weeks.
4. Amy knew how old the man was. Why did she keep talking to him?
A: Because she said that she developed feelings for the man even tho she didn't meet him yet.
5. Had the man ever talked other girls into meeting with him in person?
A:she was talking to other girls because they were telling Amy.
6. Why is Amy still worried?
A: She is worried because the guy is soon going to out of prison and might be calling her again.
7. Why does Amy encourage other teens to talk to their parents about what's going on even though they might get in trouble?
A: Amy encourages teens because their parents could help stop whatever is happening before it gets even worse.
1. Why aren't many teens concerned about giving out personal information online?
A: They aren't concerned because they don't think nothing will happen just because their online and not face to face.
2. At what point do you think Amy regretted sharing her personal information?
A: When the man kept on calling her and going to her house.
3. What were the consequences of sharing her personal information online?
A: The consequnces were that the man kept on calling her, messaging her online, and he kept on going to her house.
4. If your friend confides in you that he or she is thinking about meeting in person with anyone he or she first “met” online, what would you tell him or her?
A: I would tell them that they are full of stupidity and should think about it twice because it can be dangerous.
Monday, November 7, 2011
Bullycide
I learned that bullying is now a felony in many states due to suicidal incidents involcing bullying. Many people get bullyed everyday that they can't handle it no more. Many people don't think as this as a serious crime, but to the federal government, it is. Many anti bullying programs go to schools to show kids the consquences or how to prevent bullying
Something that could of stopped Ryan from committing suicide is he should of told his dad at first. Ryan didn't think of it as a bad thing at first, but the bullying continued. As it continued, it got way worse for Ryan. Also, Ryan's dad shouldn't even of let Ryan go online because looked what happened now.
Something that could of stopped Ryan from committing suicide is he should of told his dad at first. Ryan didn't think of it as a bad thing at first, but the bullying continued. As it continued, it got way worse for Ryan. Also, Ryan's dad shouldn't even of let Ryan go online because looked what happened now.
Friday, November 4, 2011
Cyberbullying Across Devices and Services
1. Who was involved in the story and what roles did they play? Who was the target? Who were the offenders? Were there bystanders and/or upstanders?
A: Stacey was involved in the story and also 2 other girls. Stacey was the target in this story. The offenders were 2 girls. The boyfriennd is the bystander but there is no upstanders.
2. How do you think the online cruelty might be different from offline behavior?
A: It's different because people who harrass people online are scared to do it face to face so they turn their attention to the internet.
3. Have you ever witnessed cyberbullying and not gotten involved, but later wished you had? What prevented you from taking action? What might you do differently if it happened again?
A: Never in my life have i encountered someone being cyber bullied.
4. Why is it important to take action to de-escalate online cruelty whenever you witness it?
A: It is important because it could get worse for the target if they get harrassed everyday online.
A: Stacey was involved in the story and also 2 other girls. Stacey was the target in this story. The offenders were 2 girls. The boyfriennd is the bystander but there is no upstanders.
2. How do you think the online cruelty might be different from offline behavior?
A: It's different because people who harrass people online are scared to do it face to face so they turn their attention to the internet.
3. Have you ever witnessed cyberbullying and not gotten involved, but later wished you had? What prevented you from taking action? What might you do differently if it happened again?
A: Never in my life have i encountered someone being cyber bullied.
4. Why is it important to take action to de-escalate online cruelty whenever you witness it?
A: It is important because it could get worse for the target if they get harrassed everyday online.
Thursday, November 3, 2011
Turn Down the Dial on Cyberbullying and Online Cruelty
1. Do you think Ricardo is a cyberbully? Why or why not?
Yes because he harrasses people on the internet.
2. What does Ricardo mean when he says that information “gets around really quick”?
That the word spreads really quick .
3. Ricardo thinks that harassing others on Internet, rather than in person, appeals to some teenagers because they can’t be attacked back physically. What do you think?
I think it is because they are really scared and don't want to be face to face in reality.
4. Have you ever encountered online cruelty? How do you think someone might feel after being the target of it?
No i have never encountered online cruelty. They feel very depressed and sometimes committ suicide because of all the cruel messages they recieve.
5. Define the Key Vocabulary words target and offender.
Target-A person who is the object of an intentional action
Offender- A person who has malicious intent to hurt or damage someone
6.How might the targets of online cruelty feel like they can be bombarded with negative comments at any time, anywhere?
They feel like they need to watch out online, but some that are already being cyberbullied feel very depressed.
Yes because he harrasses people on the internet.
2. What does Ricardo mean when he says that information “gets around really quick”?
That the word spreads really quick .
3. Ricardo thinks that harassing others on Internet, rather than in person, appeals to some teenagers because they can’t be attacked back physically. What do you think?
I think it is because they are really scared and don't want to be face to face in reality.
4. Have you ever encountered online cruelty? How do you think someone might feel after being the target of it?
No i have never encountered online cruelty. They feel very depressed and sometimes committ suicide because of all the cruel messages they recieve.
5. Define the Key Vocabulary words target and offender.
Target-A person who is the object of an intentional action
Offender- A person who has malicious intent to hurt or damage someone
6.How might the targets of online cruelty feel like they can be bombarded with negative comments at any time, anywhere?
They feel like they need to watch out online, but some that are already being cyberbullied feel very depressed.
Tuesday, November 1, 2011
Taking Perspectives on Cyberbullying
1. Have you ever had a conversation with someone when you had a different point of view? What happened? How did you feel?
A: Yes i have actually plenty of times in my lifetime. Nothing reallly casue i wouldn't do anything. I felt anger inside me but no angry enough to let it out.
2. Why is it important to understand someone else's perspective?
A: So you can already what they look like because if someone seems like a disturbed person by how they look like then it's garunteed to be angry in their emotions.
1. Are actions in an online community (like the slurs on the website) different than actions taken offline (like the notes left on Lyla’s locker at the school)? Why, or why not?
A:Yes it is different because your not actually confronting the person face to face but you are doing it online because you don't want them know it's you.
2. How are anonymous actions – like posting on a website or leaving a note – different from things done face-to-face?
A: Because they don't want them to know it's them making the website so they do it online.
3. Imagine you were a bystander at this school, watching this situation unfold. What do you think you would have done? Do bystanders have a responsibility to do anything?
A: I woould have taken action and confront everyone who did the website. Yes, bystander do have responsibility too because they as well can stop this from getting worse.
A: Yes i have actually plenty of times in my lifetime. Nothing reallly casue i wouldn't do anything. I felt anger inside me but no angry enough to let it out.
2. Why is it important to understand someone else's perspective?
A: So you can already what they look like because if someone seems like a disturbed person by how they look like then it's garunteed to be angry in their emotions.
1. Are actions in an online community (like the slurs on the website) different than actions taken offline (like the notes left on Lyla’s locker at the school)? Why, or why not?
A:Yes it is different because your not actually confronting the person face to face but you are doing it online because you don't want them know it's you.
2. How are anonymous actions – like posting on a website or leaving a note – different from things done face-to-face?
A: Because they don't want them to know it's them making the website so they do it online.
3. Imagine you were a bystander at this school, watching this situation unfold. What do you think you would have done? Do bystanders have a responsibility to do anything?
A: I woould have taken action and confront everyone who did the website. Yes, bystander do have responsibility too because they as well can stop this from getting worse.
Monday, October 31, 2011
Phishing Tails
1. If you received this message in your email, what would you do with it?
A: I would figure out who changed everything because all my information would be on there.
2. Would you be more inclined to act if you are a regular user of eBay?
A: Yes you would be more inclined.
3. What does the URL (link address) tell you about the origin of this message?
A: That the user should verify and maybe delete the ebay because they could be buying stuff without the user knowing.
4. Do you think it’s real? Why or why not?
I don't know forsure because it could just be anyone trying to get more information about the user by sending these fake messages.
1. What is “phishing”? Give some examples cited in the article.
A: Phishing is people who pretend to be from earthlink and sends out fraud messages to people to get their credit card number, password, etc.
2. According to government officials and private investigators, who are the most likely groups behind most phishing attempts?
A: Phishers were most likely teens and other people living around.
3. How is fraudulent email spread that makes it so difficult to track?
A: They often use computer worms, spread from machine to machine.
4. Do federal investigators think Helen Carr is a typical phisher? Why or why not?
A: Becaue they found a mass email crop from Helens computer.
5. According to Christopher Wray, what is the single biggest type of consumer fraud?
A: Identitiy is the single biggest type of consumer fraud.
6. According to the article, why is it often difficult to tell the difference between a legitimate and fraudulent email?
A: Because the phisher are getting slicker and slicker as time goes on
7. ASK What are some ways phishers try to hook unwary recipients, according to the article?
A: They send messages pretending to be from earthlink and get the information from the user. They Would send fake links to make it less noticable that they are fishers.
A: I would figure out who changed everything because all my information would be on there.
2. Would you be more inclined to act if you are a regular user of eBay?
A: Yes you would be more inclined.
3. What does the URL (link address) tell you about the origin of this message?
A: That the user should verify and maybe delete the ebay because they could be buying stuff without the user knowing.
4. Do you think it’s real? Why or why not?
I don't know forsure because it could just be anyone trying to get more information about the user by sending these fake messages.
1. What is “phishing”? Give some examples cited in the article.
A: Phishing is people who pretend to be from earthlink and sends out fraud messages to people to get their credit card number, password, etc.
2. According to government officials and private investigators, who are the most likely groups behind most phishing attempts?
A: Phishers were most likely teens and other people living around.
3. How is fraudulent email spread that makes it so difficult to track?
A: They often use computer worms, spread from machine to machine.
4. Do federal investigators think Helen Carr is a typical phisher? Why or why not?
A: Becaue they found a mass email crop from Helens computer.
5. According to Christopher Wray, what is the single biggest type of consumer fraud?
A: Identitiy is the single biggest type of consumer fraud.
6. According to the article, why is it often difficult to tell the difference between a legitimate and fraudulent email?
A: Because the phisher are getting slicker and slicker as time goes on
7. ASK What are some ways phishers try to hook unwary recipients, according to the article?
Friday, October 28, 2011
Private Today, Public Tomorrow
1. Why do you think things posted online tend to persist, even when you prefer they didn't?
Cause if you were to apply for a job or go to a college then they can check up your information on any inline website.
2. What kinds of things might be good for your reputation in the future if they are posted online now? What kinds of things might be harmful?
Like pictures of getting scholarships, or any other achievments. It could be harmful to post up pictres of you at a party drinking, smoking, or doing something else inappropriate.
1. Do you think Millersville University was justified in disqualifying Stacy from earning her teaching degree because of her profile page? Why, or why not?
A: No because she was old enough to drink so i don't know why the university is making a big deal out of it.
2. How would the situation be different if the context of the photo were taken into account? For instance: What if the caption of the photo was not “Drunken Pirate,” but “Happy Halloween” or “My friend forced me to wear this pirate hat”? What if a post accompanying the photo said that it had been taken at a child’s birthday party and Stacy was drinking punch?
A: Then the college wouldn't make a big deal about it.
3. What if Stacy’s friend Joe had posted the picture of Stacy without her knowing it, and tagged her with the “Drunken Pirate” caption. Does the fact that Joe posted the picture change the situation? Why or why not?
A: Yes because stacy doesn't have no clue and would have to blame all of it on her friend Joey.
4. Does Joe have a responsibility to ask Stacy before he posts (and tags) a picture of her? Do other people, including strangers who come across the photo online, have the responsibility to check with Stacy before they tag or repost the photo? Why, or why not?
A: Yes he does have responsibility. Yes they do have the responsibility to check stacy before they tag because it could really effect her career.
Cause if you were to apply for a job or go to a college then they can check up your information on any inline website.
2. What kinds of things might be good for your reputation in the future if they are posted online now? What kinds of things might be harmful?
Like pictures of getting scholarships, or any other achievments. It could be harmful to post up pictres of you at a party drinking, smoking, or doing something else inappropriate.
1. Do you think Millersville University was justified in disqualifying Stacy from earning her teaching degree because of her profile page? Why, or why not?
A: No because she was old enough to drink so i don't know why the university is making a big deal out of it.
2. How would the situation be different if the context of the photo were taken into account? For instance: What if the caption of the photo was not “Drunken Pirate,” but “Happy Halloween” or “My friend forced me to wear this pirate hat”? What if a post accompanying the photo said that it had been taken at a child’s birthday party and Stacy was drinking punch?
A: Then the college wouldn't make a big deal about it.
3. What if Stacy’s friend Joe had posted the picture of Stacy without her knowing it, and tagged her with the “Drunken Pirate” caption. Does the fact that Joe posted the picture change the situation? Why or why not?
A: Yes because stacy doesn't have no clue and would have to blame all of it on her friend Joey.
4. Does Joe have a responsibility to ask Stacy before he posts (and tags) a picture of her? Do other people, including strangers who come across the photo online, have the responsibility to check with Stacy before they tag or repost the photo? Why, or why not?
A: Yes he does have responsibility. Yes they do have the responsibility to check stacy before they tag because it could really effect her career.
Subscribe to:
Posts (Atom)