Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged e-safety

Rss Feed Group items tagged

Anne Bubnic

AT&T Takes Online Safety to the Classroom - 0 views

  •  
    AT&T announced it is returning to the classroom through online safety education developed by the Internet Keep Safe Coalition (iKeepSafe) and presented by Drug Abuse Resistance Education (D.A.R.E.) officers.The Nation's Largest Broadband Provider and 4,500 D.A.R.E. Officers will Provide Online Safety Lessons to Parents, Students and Communities Nationwide.
Anne Bubnic

Cyber Safety/Social Networking Safety Measures - 0 views

  • For the past two years Blumenthal and other states' attorneys general have negotiated with both Facebook and MySpace to implement more than 60 new safety measures to protect children from online predators and from gaining access to inappropriate content, like pornography.
  • Under the agreement with Facebook, its officials have agreed to prominently display safety tips, and to require users under the age of 18 to affirm that they have read the tips. Users over 18 can no longer search for under-18 users, and Facebook officials will automatically be notified when someone under 18 is in danger of providing personal information to an adult user.
  • Parents will also be provided with tools to remove a child's profile from the site. Inappro­priate images and content will be removed, and ads for age-restricted products, like alcohol and tobacco, will be limited to users old enough to purchase those items. Most significantly, Facebook agreed to diligently search for and remove profiles of registered sex offenders, and it will "in­crease efforts to remove groups for incest, pedophilia, cyber-bullying and other violations of the site's terms of service and expel from the site individual violators of those terms."
  • ...2 more annotations...
  • Under the agreement, MySpace now allows parents to submit their child's e-mail address to prevent anyone from using that e-mail address to set up a profile (e-mail addresses are required in order to set up an account for either Facebook or MySpace, and people may search for "friends" by entering e-mail addresses). For anyone under 16, MySpace will automatically set the profile to "private," allowing only approved people to view the profile. There is now a closed "high school" section of the site set aside for users under 18.
  • Like Facebook, MySpace officials will also "obtain and constantly update a list of pornographic Web sites and regularly sever any links" between the sites. MySpace agreed to provide a way to report abuse on every page that contains content. The site's officials also prom­ised to respond to complaints of inappropriate content within 72 hours.
  •  
    Connecticut Attorney General Richard Blumenthal has made it one of his priorities to install methods of protection for the state's children when it comes to using these Web sites, hoping to "make social networking safer," according to a press release generated by his office. Efforts by Facebook and MySpace to protect privacy are described in this article.
Anne Bubnic

E-safety: Developing AUPs for Effective Practice of Internet Safety - 0 views

  •  
    Download this free 64-page document on developing appropriate policies and procedures to ensure safe use of the Internet. A checklist for developing acceptable use policies and practical strategies for responding to incidents are also included. Developed by the Internet Safety Group of New Zealand.
Anne Bubnic

Digital Directions: 'First Line of Defense' - 0 views

  •  
    There's been a definite uptick in the number of school districts that have adopted Internet-safety curricula, says Godlis, and because of a recent update to the federal Children's Internet Protection Act, which requires schools receiving money through the federal E-rate program to provide Internet-safety education to students, that number will surely rise.
JOSEPH SAVIRIMUTHU

Cybersmart Detectives [Game] - 0 views

  • Cybersmart Detectives is an innovative online game that teaches children key internet safety messages in a safe environment. Children work online in real time liaising with community professionals to solve an internet-themed problem. The activity is based in the school environment, and brings together a number of agencies with an interest in promoting online safety for young people, including State and Federal Police, internet industry representatives and child welfare advocates. In the scenario, children play the role of a school Deputy Principal concerned about the welfare of a new student, who may be being bullied by someone they have met in an internet chat room. Guided by a series of clues, children work collaboratively in teams to solve the mystery of what is worrying the student, and why. 'Cybersmart Guides' respond to the questions and theories posed by the students, and guide the teams through each of the 'clues'. As the scenario unfolds, the children discuss the risks of certain online and offline behaviours, and ways of managing those risks. Although the scenario presented in the activity is simulated, the sense of urgency that excites a class of children taking part is very real. By the end of the activity children will have learned some valuable lessons about some of the risks associated with internet use, especially useful tips for chatting safely online. More importantly, the issues that lie behind the story will have been discussed with professionals who deal with similar issues on a daily basis. Cybersmart Detectives was initially developed by UK-based child advocacy agency Childnet International, and until 2005, operated under the name of Net Detectives. The activity is now independently operated by E-ngagelive. The Australian Communications and Media Authority ( ACMA ), by agreement with E-ngagelive , has adapted the activity for use in Australian schools under the name Cybersmart Detectives.
  •  
    Another example of emerging norms focussed on empowerment of children, this game is played online and accessible only to students in the United Kingdom.
Anne Bubnic

Protecting Children from Adult Content on Wireless Devices - 0 views

  • What You Can Do If you are concerned about your children accessing adult material from their wireless phones/devices, consider the following: Monitor how your children are using their wireless phones or other wireless devices. For example, are they using them mainly for talking, or are they using them for messaging, taking photos and downloading applications? Check with your carrier to see what types of material it offers and what types can be accessed from your children’s handsets. Check with your carrier to see if there are ways to prevent access to and downloading of content that may contain inappropriate material and that is available on a per-use or per-application basis (e.g., games, wall paper images, songs). Monitor your bill. Any content purchases made from a wireless phone should appear on your monthly bill, so check your bill to see if any purchases have been made from your children’s phones/devices. The FCC requires that the descriptions of charges on wireless carrier bills be full, clear, non-deceptive, and in plain language. Check with your carrier to see what handsets are available for your children that are not capable of accessing advanced applications that may contain adult material. Check with your carrier to see whether subscriptions to wireless data or wireless Internet packages also offer access to adult material on your children’s phone.
  •  
    With the benefits of wireless technology comes a potential harm: the growing use of wireless phones and devices by children affords them the opportunity to access adult material that may be inappropriate for them. The FCC offers 6 tips for wireless safety.
Kate Olson

The Dirt E-Secrets of an Internet Kid | Teens Today with Vanessa Van Petten - 0 views

  •  
    Vanessa Van Petten's e-book about kids online - I'm really looking forward to this!
Anne Bubnic

Cyberbullying: Understanding and Addressing Online Cruelty - 0 views

  •  
    This issue of Curriculum Connections provides educators with the tools to increase awareness about the problem of cyberbullying among their students. Each lesson introduces age appropriate information and skills that encourage youth to think critically about Internet communication, develop empathy for others, respond constructively to cyberbullying and online aggression and interact safely on the Internet. The resources in this edition of Curriculum Connections will be an important part of your school's broader efforts to foster an increased culture of e-safety and respect for differences among youth.
Anne Bubnic

Intro to CyberCITZ - 2 views

  •  
    Organized around the way middle schoolers use the Internet, the CyberCitz Project provides teaching materials on Internet safety, security and ethics. This new project includes an Educators' Guide, a youth website, technology citizenship posters, and e-lessons on a K-12 learning management system. This project was produced in collaboration with the Virginia Department of Educational Technology and IIIA at James Madison University. Navigate through the curriculum content using the sidebar on the left side of the screen.
buyglobalshop

Buy Verified Payoneer Accounts - 100% Best Quality & full document verified - 0 views

  •  
    If you have been investigating diverse alternatives for overseeing your accounts, you may have come over the term Payoneer accounts. But what precisely is a Payoneer account, and how can it advantage you? Payoneer is a worldwide installment stage that permits people and businesses to send, get, and oversee their cash over borders. With a Payoneer account, you can get installments from clients and marketplaces around the world, all whereas profiting from competitive trade rates and moo fees. Buy Verified Payoneer Accounts Is it secure to utilize Payoneer? In today's advanced age, online installment stages have ended up progressively prevalent for businesses and people alike. Payoneer is one such stage that offers clients a helpful way to send and get cash over borders. In any case, with the rise of cyber dangers and information breaches, numerous individuals are cleared out pondering: In this article, we will investigate the security highlights that Payoneer has in put to secure its users' touchy data. From encryption to personality confirmation forms, we will look at the safety measures that Payoneer takes to guarantee the security of its stage. Also, we will examine common dangers related with utilizing online installment administrations and give tips on how to encourage secure your accounts whereas utilizing Payoneer. By the conclusion of this article, you will have a way better understanding of the security measures in put when utilizing Payoneer and feel more sure in utilizing this stage for your monetary transactions. Buy Verified Payoneer Accounts Can I utilize Payoneer to get installments from clients? Yes, you can unquestionably utilize Payoneer to get installments from clients. Payoneer is a prevalent installment benefit that is trusted by millions of clients around the world for its unwavering quality and security. It permits you to effectively get reserves from clients, companies, or marketplaces in a fast and effective manner. When you utilize Pa
JOSEPH SAVIRIMUTHU

Know IT All for Primary Schools - 1 views

  • Childnet's Know IT All for Primary Schools has been especially designed for primary school staff to help them understand important E-safety issues and how to help young pupils get the most out of the internet
  •  
    From Childcare International. Safey issues for kids.
Jocelyn Chappell

Judie Nightingale: Web alert | E-learning | - 0 views

  • To help teachers get their heads around this concept and related internet safety matters, Vodafone is launching a new education pack later this year, featuring teaching materials sourced from across Europe.
  •  
    vodaphone targetting social network 'training' at teachers in 2008
Jess McCulloch

Keeping students cybersafe! « On an e-journey with generation Y - 0 views

  •  
    As we are pioneers in cyberspace, cybersafety is a concern that is being refined and evaluated all the time - trying to balance transparency with privacy, allowing students some freedom, yet protecting them and ensuring their safety at all times. This article provides a review of what was done with a class of students over a year's time to teach them digital citizenship and cybersafety.
Anne Bubnic

National Broadband Plan / ARRA 2010 [PDF] - 0 views

  •  
    A plan for use of broadband infrastructure and services in advancing consumer welfare, public safety & homeland security, education, worker training and other national purposes as mandated by the American Recovery and Reinvestment Act (ARRA). The commission wants to cut the red tape when it comes to educational efforts by increasing the supply of digital content and online learning systems and promoting digital literacy for students and teachers. The FCC also suggested an upgrade to the beleagured E-Rate grant program to allow for additional connectivity, flexibility and efficiency.
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • ...3 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
adina sullivan

An E-Rate Primer for Schools and Libraries [pdf] - 0 views

  •  
    Internet Safety Policies and CIPA (from ERATE Central).
Anne Bubnic

You Have to Be a Parent Online Too - 0 views

  • "When we were kids, our parents always told us not to talk to strangers. That was drilled into our heads," he said. "But now, we have to factor in what happens on the Internet."
  • Security settings and parental involvement are especially important in the virtual world, Morris urged. "Check your child's e- mail account on a regular basis. You're the parent; you can do that."
  • While social networking sites like Facebook, Myspace and Xanga can be hot-spots for sexual predators, "not everything about these sites is bad," Morris said, noting some of the most up-to-date information after the NIU shootings was found on Facebook. "Good things do occur, but we need to make sure we're monitoring them," he said. Morris urged the group to keep home computers in plain sight, to outline their expectations and review communications regularly with their children. "We want to build that level of communication with their kids," he said. "If they're talking to someone they shouldn't, we want them to be able to come to us. A child should be able to listen to a parent more than a predator."
  •  
    Parents today have responsibilities in both the real world and the virtual world, Kane County Regional Office of Education Director Phil Morris told the Elgin Academy community Tuesday.
Anne Bubnic

Kids online? Cox Survey: Contact with strangers is not unusual. - 0 views

  • One in 10 of these preteenagers has responded to and chatted online with strangers, according to the Tween Internet Safety Survey, sponsored by Cox Communications and the National Center for Missing and Exploited Children.
  • 90 percent of American kids have used the Internet by age 9 and more than a third of 11- and 12-year-olds have a profile on social-network sites such as MySpace and Facebook.
  • Of the tweens with social-network profiles, 61 percent post personal photos online, 48 percent admit to posting a fake age online and 51 percent have received messages from people they didn't know.
  • ...2 more annotations...
  • The survey showed tweens' online presence doubles or even triples among 8- to 10-year-olds and 11- and 12-year-olds: The 42 percent of children 8 to 10 with personal e-mail accounts increases to 71 percent for those 11 and 12, for instance, and 41 percent of 11- and 12-year-olds have an instant-messaging screen name, compared with 15 percent for kids 8 to 10.
  • Half of the 11- and 12-year-olds have their own cell phones -- used for text messaging and taking and transmitting digital photos as well as for traditional calling -- while 19 percent of those 8 to 10 have their own cell phones.
  •  
    One in five of the nation's wired "tweens" -- kids ages 8 to 12 -- has posted personal information on the Internet, and more than a fourth have been contacted online by strangers, a poll released Tuesday found.
Judy Echeandia

Schools caught in internet safety dilemma [eSchool News, Nov. 17, 2008] - 0 views

  •  
    Solutions such as eGuardian could provide greater protection for kids, but at what cost (e.g., market profiling)?
1 - 20 of 23 Next ›
Showing 20 items per page