Author Archive

April 10, 2009

Tell a Story – Win a Trip to NECC 2010


Hi Folks,
      Do you have a story that shows how technology impacts the lives of students?  Do you know how to create simple movies?  If so, that combination can win you a trip to NECC in Denver in 2010.

     As part of their 30th Anniversary efforts, ISTE has put out a call
for a Digital Story Telling Corp, and is asking educators to submit
videos of stories that need to be told. 

     Bernajean Porter has held a number webinars about it.  You can access an Adobe Connect recording of one webinar by visiting the ISTE Digital Story Telling wiki  and clicking on the link to
the webinar is at the top of the page.
      Videos that have been and will be submitted will be shown at NECC and
will be used in efforts to move Tech Ed funding forward.  Submitted
videos can be seen at .

     Here’s my story. I’m hardly a George Lucas as far a video is concerned, and this video doesn’t qualify for the contest, because it’s a bit too long, but I didn’t post it to win the contest.  It’s simply a story that needs to be told and might help ISTE in their efforts to advance the cause of technology in education.

     So if you have a story to tell, break out the video camera and tell it!

5:56 AM Permalink
February 13, 2009

Stop Cyberbullying and a Few Reflections

On February 25th, in Washington, DC, WiredSafety will host the 9th annual Wired Kids Summit. It’s a day where the kids are the stars. They present awards to their favorite web sites that entertain, educate, and keep kids safe. They present research they have done as part of their Teenangels and Tweenangels training. They are on stage and the industry leaders, law enforcement, policy makers, and other adults are the audience.
This year we will be launching our Free Stop Cyberbullying tool kit. It is a soup to nuts resource collection to help schools and parents deal with a situation that is growing daily.
Our informal surveys of more than 45,000 students indicate that 85% of them have experienced or been involved in some form of online bullying in the last year. Yet only 5% of them have made their parents aware of it.
I’ve just put the finishing touches on the professional development portion of the tool kit and there is no way I could have come close to developing this material without Adobe support and software.
The professional development is unique in that it is not add-on curriculum. It is Web 2.0 training with ideas and resources for fighting cyberbullying woven throughout the lessons and activities that will help teachers and students achieve a wide range of national standards.
Rather than simply creating a written manual, Adobe Presenter allowed me to create and include nineteen different multimedia presentations that make the content come alive. But if reading is your thing, Presenter allowed me to include the text of the presentation as searchable notes.
When it came to creating tutorials on making and using blogs, wikis, and other Web 2.0 tools in the classroom, Adobe Captivate 4 allowed me to make ten video tutorials that show teachers the step by step processes.
Needless to say, we used Acrobat to create PDF files throughout the tool kit, and dozens of our WiredSafety videos, animations, and games that are included throughout the product were created with Flash and other Adobe tools.
Finally, I used DreamWeaver to package my material and send it off to be included in the final product that we will announce at the Summit.
This all started seven years ago, as part of a state grant program that funded twenty-one projects to improve reading and writing with technology. I was mentoring in the Atlantic City School District.
The grant required teachers to create a web site to document and disseminate their work. I had been using a program called 3DWriter, which I had developed just for teachers, and was having good success. Then, Marilyn Cohen, the visionary Technology Director of the district asked me to take a look at Macromedia Contribute. After examining it for about 30 minutes, I was sold. The teachers took to it like ducks to water. By the end of the year they had created more content than any of the other twenty grant programs.
The amazing work those teachers did with Contribute, helped me become a Macromedia Education Leader (MEL), and gain the support of a great company and a dynamic group of educators.
A few years later Adobe acquired Macromedia and the MEL’s met the Adobe Master Teachers. The merging of the two groups into the Adobe Education Leader (AEL) family created the most amazing and dynamic group of educators I have ever come across.
The support offered by Adobe and my fellow AEL’s has been exhilarating and nothing short of life changing for me. I’m sure it has had the same effect on many of my colleagues and teachers throughout the world.
Thanks, Marilyn, for introducing me to Contribute and thanks, Adobe, for all you do for me and my colleagues around the globe!

7:16 AM Permalink
November 2, 2008

Cyberbullying Toolkit is in the process of developing a Cyberbullying Toolkit for schools that will contain resources of all types including policy, risk assessment, video, animations, games and classroom lessons.
Most if the material in the tool kit has been developed using Adobe Presenter, Acrobat, Director, and Flash.
Thanks to the generosity and support of Adobe and others, the toolkit will be available FREE to anyone.
I use Moodle as a cyber sandbox for testing. If you would like an advanced peek at a few of the activities that will be in the toolkit, you can visit the sandbox using the following guest login.
Go to
Username: toolkit
Password: wiredsafety
There is a feedback forum. Your questions, comments, and suggestions are appreciated.
If you would like to be notified when the toolkit is available, just send an email to art at wiredsafety dot com.

10:17 AM Permalink
September 21, 2008

BFF or Worst Enemy

bff.JPGWe tell our children not to share personal information online. That’s the right message, but often we are giving it for the wrong reason. Adults often think that sharing personal information is an invitation to predators. While that my have some truth, research shows that predators don’t use that information to track down victims. It also shows that kids who want to avoid predators generally do so and handle online strangers appropriately.
So if we are giving the right message for the wrong reason, what is the right reason? The reason for not sharing too much information is actually something that children can relate to and accept than the stranger danger message. Sharing too much information can lead increases in cyberbullying, trouble with friends, trouble with school officials, trouble with college acceptance, or trouble with future employers, not to mention trouble with the parents of boy friends or girl friends.
For an activity that you can do with your children or conduct with your class visit “Put Your Best Foot Forward”, one of my Adobe Presenter, Cyber Safety through Information Literacy lessons at WiredSafety.
But there is another part to this important message that is often overlooked. Sometimes your best friend forever (BFF) can be your worst enemy. You might be safe and not share personal information, but that’s not enough. You have to make your friends aware for the dangers of sharing and make sure they don’t share any of YOUR personal information.
This Flash animation illustrates my point. It may be a little over the top, but we produced it with our tongue planted firmly in our collective cheeks. You can also download the essence of this blog and the animation in PDF format as a message you can present to teens to help make them Cyber Safe and Information Literate!

7:18 AM Permalink
August 23, 2008

Sydney Safe Seeker – Internet Safety Game

sydney1.JPGSo far I’ve given you two interactive Flash activities to help you begin “the talk” about sexual predators with your children and I promised to give you a preview of a game we are creating to measure a child’s vulnerability to the ten ploys used by sexual predators.
The game was created by our partner charity, the Child Safety Research and Innovation Center and is called Sydney Safe-Seeker and the Incredible Journey Home. It’s actually suite of products focused on “Street Proofing” the child. The core of the package is the game which was created using Adobe Director, but it includes record keeps, lessons, activity sheets, and other material.
Designed for ages 5-10, it’s a role-playing adventure style game with numerous interactions that lead up to a potentially unsafe situation. Sydney and his friends are sucked through a worm hole and have to find four warp stoned in order to come home. During their journey th4e children are asked to make decisions based on game scenes that were developed to mirror real and sometimes dangerous situations.
As they play the game audio and video feedback help teach them about the wisdom of their decisions. As the same time their actions are being tracked and can later be reported to teachers or parents. Their actions determine which ploys and to what extent children are vulnerable to predators.
The value of this initiative is twofold: first, it teaches young children to incorporate street proofing into their daily lives, giving them an essential skill, which will protect them and the children they play with and second, it provides all of the community stakeholders around the child with the best safety practices to convey to children as well as materials and supplementary resources to help these caregivers and safety professionals convey these messages.
Here are just a few snips from the game.

8:59 AM Permalink
August 12, 2008

Ten Ploys Used by Online Sexual Predators

onlinepredators.JPGIn my last blog I showed you the ten ploys face to face predators use to lure children. Today I’m going to provide you with a Flash animation that shows how these same ten ploys work online.
Remember the online sexual predator picture as portrayed by the press is over stated. Predators don’t usually hide their age or the purpose of meetings. Children go knowingly and willingly.
It is really only a small segment of the teen population that is at risk. They are the teens who would be at risk off line. Often they are sexually active and have a lot of issues in their lives.
However, a small percentage of that small percentage are youth who are groomed a lured into meetings without knowing they are in for trouble. Whether it is off line or online, this can be prevented by having frank talks with your children about predators and how they work.
Here’s the Flash animation of The Ten Ploys Sexual Predators Use Online. If you would like to download and send this blog and animation to someone as an Acrobat 9 PDF Right-click here and save the file or link to your computer.
In my next blog, I’ll give you a preview of Sydney Safe Seaker, the video game that measures a child’s susceptibility to the ten ploys used by sexual predators.

7:10 AM Permalink
August 5, 2008

Ten Ploys of Offline Sexual Predators

As they say, the best laid plans of mice and men…
This entry is actually the first of two entries, but I created it a week ago and forgot to publish it. The second entry was published a few hours ago. So I guess today will be a double header.
sydney.JPG Sexual predators use specific ploys to ensnare their victims. Later this year, the Child Safety Research and Innovation Center (CSRIC), a Canadian online safety charity, will be releasing an adventure game aimed at elementary school children.
Sydney Safe-Seeker and the Incredible Journey Home multimedia game provides an interactive exploratory environment where the children ages 5 – 10 are asked to make decisions based on game scenes that were developed to mirror real and sometimes dangerous situations. The game actually measures and reports back to teachers and parents the vulnerability of the child to ten different ploys used by sexual predators.
In addition to measuring and reporting, the game develops safe habits through the use of prompts and feedback during the course of the game. The more the child plays, the more they learn about safety.
Here’s an
interactive animation
that was created using characters from the game. It will provide you with information about the ten ploys used by face to face predators.
Thanks to Adobe Acrobat 9, multimedia can now be embedded in the PDF. If you would like this blog and animation in PDF format that you can send to others, just right-click here and select Save File As… or Save Link As…

11:22 AM Permalink
July 30, 2008

Having “The Talk” with Your Teen

Ok, it’s time for you to have “the talk” with your teen. No, no… I don’t mean THAT talk. I mean the talk about Internet safety. But having this talk is often more uncomfortable to the parent or the teacher than the birds and the bees talk, because in the case of technology, the teens know more than the parents.
You may have been paying close attention to the media messages about online predators and have carefully prepared yourself with all of the stories about their deceptions. Then when you have the talk, your children are likely to listen dutifully and promise to be careful, or they will roll their eyes and say, “Duh… Iike I’ve heard this a million times before. I AM careful online.”
The media message about the dangers of the Internet is one based on the need to capture eyeballs and increase the bottom line, not the need to educate or keep people safe. While the danger is real, media picture of the predator and victim is not accurate. I would like to try change that situation by providing you with information based on the latest scientific research and tens of thousands of conversations I’ve had with teens in my role as a technology teacher for more than a quarter century and as the Educational Technology Director of, the world’s largest Internet safety and help organization.
Each time I blog here, I will try to provide you with information and resources that will help you get the dialog going in painless ways. I’ll provide personal insights, stories, or facts based on solid research along with some resources created with the help of Adobe products, that you can view and in some case download.
So to get the dialog going, check out this Adobe Presenter presentation about the facts and myths surrounding Internet sexual predators Then check back here for my next post in which I’ll talk about the ten ploys used by offline and online sexual predators.

5:55 PM Permalink