, to see if you have full access to this publication.
Book Titles No access

Parenting for the Digital Generation

A Guide to Digital Education and the Online Environment
Authors:
Publisher:
 2022

Summary

Parenting for the Digital Generation provides a practical handbook for parents, grandparents, teachers, and counselors who want to understand both the opportunities and the threats that exist for the generation of digital natives who are more familiar with a smartphone than they are with a paper book. This book provides straightforward, jargon-free information regarding the online environment and the experience in which children and young adults engage both inside and outside the classroom.

The digital environment creates many challenges, some of which are largely the same as parents faced before the Internet, but others which are entirely new. Many children struggle to connect, and they underperform in the absence of the social and emotional support of a healthy learning environment. Parents must also help their children navigate a complex and occasionally dangerous online world.

This book provides a step-by-step guide for parents seeking to raise happy, mature, creative, and well-adjusted children. The guide provides clear explanations of the keys to navigating as a parent in the online environment while providing practical strategies that do not look for dangers where there are only remote threats.

Keywords



Bibliographic data

Copyright year
2022
ISBN-Print
978-1-4758-6195-2
ISBN-Online
978-1-4758-6196-9
Publisher
Rowman & Littlefield, Lanham
Language
English
Pages
276
Product type
Book Titles

Table of contents

ChapterPages
    1. Dedication No access
    2. Contents No access
    3. Preface No access
    4. Introduction No access
    5. About This Book No access
    1. A. What Families Need No access
    2. B. Household Strategies to Tame Intrusive Technology No access
    3. C. Raising Children for Success No access
    1. A. Using Age and Developmental Milestones to Guide Online Engagement No access
    2. B. From Idiot Box to Trolls No access
    3. C. Mental and Behavioral Health No access
    1. A. Introduction No access
    2. B. Information Literacy Skills No access
    3. C. Digital Literacy Skills No access
    4. D. Privacy, Netiquette, and Security Literacy Skills No access
    1. A. Introduction No access
    2. B. Origins No access
    3. C. Definition and Attributes of Distance Education No access
    4. D. Modalities—Face-to-Face, Online, and Blended Instruction No access
    5. E. Cognitive Science and Learning Theory No access
    6. F. Supplemental Education—Distance Learning Outside of Accredited Institutions No access
    7. G. FERPA—Protecting Educational Privacy No access
    1. A. The Keys to Effective Online Education No access
    2. B. Learning in Practice No access
    3. C. Learning Management Systems and Parental Access No access
    4. D. Preparing for Online Instruction No access
    5. E. Homework and Take-Home Assignments No access
    6. F. Learning beyond the Classroom No access
    1. A. Accessibility No access
    2. B. Special Education under IDEA No access
    3. C. The Digital Divide No access
    4. D. Diversity and Inclusion No access
    1. A. Introduction No access
    2. B. Navigating Modern Social Media’s Cancel Culture No access
    3. C. How Employers and Universities Use Applicants’ Online Presence No access
    4. D. What to Build No access
    5. E. What to Avoid No access
    1. A. Introduction No access
    2. B. Copyright No access
    3. C. Fair Use and Fan Fiction No access
    4. D. Content Management by the ISPs No access
    1. A. Introduction No access
    2. B. Sex Education No access
    3. C. Sexualization and Body Shaming across Media No access
    4. D. Sexual Orientation and Gender Identity No access
    5. E. Nudity, Sexually Explicit Content, and Obscenity No access
    6. F. Prohibited Content: Child Pornography No access
    7. G. Violent Content and Mature Games No access
    1. A. Introduction—the Harms of Online Harassment No access
    2. B. Harassment versus Protected Speech No access
    3. C. Obligations of the School No access
    1. A. Introduction No access
    2. B. Digital Self-Harm No access
    3. C. Sexploitation and Revenge Porn No access
    4. D. Online Sexual Predators—Digital Stranger Danger No access
    5. E. Working with Law Enforcement No access
    1. A. Contextualizing Radical Extremism No access
    2. B. Deepfakes and Disinformation No access
    3. C. Intervention Strategies No access
    4. D. School Shootings No access
    1. A. The Rest of the Internet No access
    2. B. The Deep Web No access
    3. C. The Dark Web No access
    4. D. Torrenting and Illegal File Sharing No access
    1. A. Hacking Explained No access
    2. B. Signs of a Malicious Adolescent Hacker No access
    3. C. Steps to Stop Hacking from Home No access
    1. A. Introduction No access
    2. B. eCommerce and Safe Shopping No access
    3. C. Advertising and Promotion No access
    4. D. Targeted Messaging, Political Manipulation, and Analytics No access
    5. E. Protection from Unwanted Intrusions No access
    6. F. Protection from Government Surveillance No access
    1. A. The Origins of Data Security: The Envelope No access
    2. B. Personally Identifiable Information No access
    3. C. Data Protection—Integrity, Availability, and Confidentiality No access
    4. D. Household Fundamentals to Protect Personal Information No access
    5. E. Tracking Device Usage and the Balance between Trust and Verify No access
    1. A. Controlling the Online Engagement No access
    2. B. Make the Most of Online Education No access
    3. C. Taking Advantage of the Internet No access
    1. 1. History of Technologies That Run the World No access
    2. 2. Understanding the Information Economy No access
  1. List of Acronyms No access Pages 243 - 246
    1. Chapter 1 No access
    2. Chapter 2 No access
    3. Chapter 3 No access
    4. Chapter 4 No access
    5. Chapter 5 No access
    6. Chapter 6 No access
    7. Chapter 7 No access
    8. Chapter 8 No access
    9. Chapter 9 No access
    10. Chapter 10 No access
    11. Chapter 11 No access
    12. Chapter 12 No access
    13. Chapter 13 No access
    14. Chapter 14 No access
    15. Chapter 15 No access
    16. Chapter 17 No access
    17. Appendices No access
  2. Bibliography No access Pages 265 - 266
  3. Index No access Pages 267 - 274
  4. About the Author No access Pages 275 - 276

Similar publications

from the topics "Psychology General"
Cover of book: Health Psychology
Edited Book No access
Philipp Stang, Maren Weiss, Martin G. Köllner
Health Psychology
Cover of book: Facetten der Teilhabe an Musikkultur
Book Titles No access
Hsin-Rui Lin
Facetten der Teilhabe an Musikkultur
Cover of book: Tractatus logico-sociologicus
Book Titles No access
Georg W. Oesterdiekhoff
Tractatus logico-sociologicus
Cover of book: Führungs- und Teamprozesse in Multiplayer-Games
Book Titles No access
Kati Hüttenrauch
Führungs- und Teamprozesse in Multiplayer-Games