Friday, October 29, 2010

Slanderous Messages

INTRODUCTION
How easy is it to cope with Slanderous messages?




There are slanderous sites that defame a person's reputation and the result is similar to someone who climbs up to the highest peak of a mountain on the planet, then takes a hen, plucks her all and decides to throw her feathers all over the Earth. Later he or she realizes it was a mistake. So, he/she decides to gather the feathers and put them back in the hen. The result ???


Does it happen in the field of education?


In Wayne County Public schools it is forbidden when at school. As a matter of fact, all social networks have been blocked. However, if a student is caught violating this rule and breaks every denied access at school computers,the comprehensive disciplinary plan contained in the student's handbook begins to be applied and the consequence takes place immediately and results depend on the due process and harm caused by this action. Nevertheless, no one can really stop the possible bad effects from Facebook on you.

Friday, October 22, 2010

Cyberbullying -Online Harrassment

Cyberbullying-Online Harrasment
      Internet is a system of interconnected networks using different electronic devices such as computers and cell phones. This way of connecting one another, started with the idea of satisfying our most important need: "to express our ideas, feelings, thoughts, culture, traditions, customs and even who we really are".

       Internet  is a world wide network that serves billions of people who work, study or simply entertain themselves using this means of communication.  It carries a broad array of electronic and optical networking technologies that may be beneficial or hurtful, depending on the mind that is interacting in it.

     Many people enjoy using the Internet or the cell phone to send text or images intended to hurt, embarrass, threaten, harass,or humiliate another person, specially a child or teenager.



      Most of the "online" harrassment is addressed to kids or teens who have a private communication without permission. In some cases it is forwarded or simply posted publicly. However, many teenagers say that most of the bullying takes place when someone has posted an embarrassing picture of them.

       
Cyberbullying is not limited to children. Adults also practice "Cyberstlaking or Cyberharrassment"  with the tendency of sex encounters. 



     Our challenge at school is to stop this bullying that most of the time takes place outside school.


Monday, October 18, 2010

CYBERBULLYING NOW?

CYBERBULLYING NOW?

Mankind has been, since creation, influenced by a being who wants to destroy us with deadly messages. The first one: a serpent mentioned in the Bible, manipulated by an invisible force, spoke up in the Garden of Eden in order to embarrass, humiliate and destroy God’s reputation. Accomplishing its task of making the first couple on Earth, misinterpret God’s command of faithfulness to mislead them until their death.
Later Zeus, a chief god in Greek Mythology, his goddesses and sons, who used to celebrate their feasts on the Mount Olympus in Greece, bullied all human beings, inferior to them, with verbal and physical communication for centuries, until they disappeared from Earth.
Centuries later, Alexander the Great, at a very young age, conquered many territories using his knowledge and skills nurtured by famed philosopher Aristotle. However, he, himself was forced to turn back by the near-mutiny of his troops in 323 BC.



This empire advanced and invaded other nations with intimidating messages. Greeks bullied many peoples and reached power. Then, Romans started to bully the rest of the nations and obtained the same world power. They, using the figure and messages of Julius Ceasar, humiliated a significant number of human beings in order to experience glory and satisfaction on the misery of others. Moreover, Jews were humiliated. Then, State Church of the Roman Empire humiliated a humble man who walked on Earth. Jesus Christ, the son of God. Afterwards all Christians were bullied and assassinated.


Likewise, Byzantine Empire, as a continuation of the Roman Empire, bullied other peoples to rule over them. However, there were many Christians emerging as an opposition to this kingdom. Therefore, Constantine paying attention to rumors, started to favour Christianity, with a strategic plan to dominate others as follows:

Constantine got a lot of Christian advisors at his court to tell him what the Christian God wanted, so he could be sure to keep God on his side. His advisors told him that God wanted Constantine to give a lot of money and land to the Church, and that God wanted the Church not to have to pay taxes, and Constantine did all those things.

Consequently, the Church manipulated power and started to rule over mankind for more than 1600 years with the ideas of threatening all, using a Latin Bible, for people not to read it or accessing it, since it was a language no longer spoken. The idea was to threaten humans and control them with an invisible force.

The same force emerged through many ingenious scientists, who discovered the atomic bomb and invisible waves used in “technology” seeking mankind advance.
Nowadays, the Internet, the cellular phone, and any other electronic devices are used to communicate one another. Nevertheless, these means have been used to harm other people’s reputation and to annihilate mankind.

Therefore, is there any advancement for us? The answer is: YES.

A new and sophisticated way to use the same invisible force, present in the Garden of Eden whose purpose was to wipe out our race through tormenting, threatening, harassing, humiliating, or embarrassing others. Especially teenagers, with the improper use of the Internet or mobile phones; almost 24 hours a day.
“ About one third (32%) of all teenagers who use the internet say they have been targets of a range of annoying and potentially menacing online activities – such as receiving threatening messages; having their private emails or text messages forwarded without consent; having an embarrassing picture posted without permission; or having rumors about them spread online.
Depending on the circumstances, these harassing or “cyberbullying” behaviors may be truly threatening, merely annoying or relatively benign. But several patterns are clear: girls are more likely than boys to be targets; and teens who share their identities and thoughts online are more likely to be targets than are those who lead less active online lives”1

How are we going to stop bullying?

1:By Amanda Lenhart, Senior Research Specialist, Cyberbullying and Online Teens . DATE: June 27, 2007

Saturday, October 9, 2010

Audacity Tutorial Experience

There is always a first time for every little thing that takes place in life. Creating and posting a tutorial about Audacity is a very meaningful experience in the fields of both telecommunications and education.
I personally started from scratch opening an account in Blogger.com. Then, posting simple messages and later, a tutorial on basic aspect about using Audacity. All these aspects were developed using a computer screen in only a few weeks to learn, apprehend,or make concepts mine. Moreover, to teach others what I "know". It is not an easy task to accomplish. There are infinite ways to comprehend what we see. Besides, to try to think what other people would think about our product is a challenge. Thus, the path is just opening as I approach it. I still need to learn how to maneuver all tools that are suitable for teaching kids who belong to the technology era, not to the "chalk board"-teacher centered classroom. But, Are we ready to incorporate what we are learning? Are we allowed to experiment new tools?, do we perceive support? So, a new horizon is showing up. This is our "Teaching Leading" opportunity to shine!
I have personally enjoyed this project, even though I stumbled several times during the weeks, I still do. But, I will never give up. My brain continues working while I am asleep. Hence, dreaming and hard work are present; I am holding them. This is my commitment. Moreover, I want to find out how to do tutorials in the classroom, without using "The Internet" but the teacher's laptop as the only resource in critical "Budget times"