{"content":{"sharePage":{"page":0,"digests":[{"id":"53320418","dateCreated":"1335309269","smartDate":"Apr 24, 2012","userCreated":{"username":"kmcureton","url":"https:\/\/www.wikispaces.com\/user\/view\/kmcureton","imageUrl":"https:\/\/www.wikispaces.com\/user\/pic\/1327630550\/kmcureton-lg.jpg"},"monitored":false,"locked":false,"links":{"self":"https:\/\/edtech12red.wikispaces.com\/share\/view\/53320418"},"dateDigested":1532288194,"startDate":null,"sharedType":"discussion","title":"pg. 256-258","description":"-The use of technologies to harass, defame, or intentionally harm another student or group of students is cyberbulling.
\n -can be dramatic and extremely damaging to children involved and result in emotional stress, withdrawal from school, relocation and even suicide.
\n
\nTools used to bully: messaging, creating a website, pictures, videos, other recordings, impersonations.
\n
\n-Best strategy to prevent the effects of cyberbylling is education teachers, students, and parents.
\n
\n-At the point that inappropriate online actions involve adults, the behavior becomes more serious and can lead to cyberstalking or engage the predator.","replyPages":[{"page":0,"digests":[],"more":0}]},{"id":"53317622","dateCreated":"1335305824","smartDate":"Apr 24, 2012","userCreated":{"username":"torigjohnson","url":"https:\/\/www.wikispaces.com\/user\/view\/torigjohnson","imageUrl":"https:\/\/www.wikispaces.com\/i\/user_none_lg.jpg"},"monitored":false,"locked":false,"links":{"self":"https:\/\/edtech12red.wikispaces.com\/share\/view\/53317622"},"dateDigested":1532288194,"startDate":null,"sharedType":"discussion","title":"pg. 229-235","description":"Modeling and Facilitating Effective Use of Technology Tools-
\n1. Protecting Students and Technology Resources
\n