Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged Using

Rss Feed Group items tagged

Dean Mantz

Educating About Intellectual Property - 5 views

  •  
    Funded by federal government. Curriculum, webinars, podcasts, links and more about Copyright and Fair Use in Education.
Steven Knight

The Door That's Not Locked - 8 views

  •  
    The web is a wonderful place, if you understand the dangers. While the Internet is an open door to a world of great information, communication and entertainment, it can also be a direct passageway to danger. The Canadian Centre is committed to helping parents, teachers, and anyone else who would like to better understand the good, bad, and ugly about the web. We're here to help keep kids safe while exploring and enjoying The Door that's not Locked. This website has been created to provide you with a one-stop-shop on all things related to Internet safety.
  •  
    All Web. No Net.
  •  
    This is a great site. No nonsense advice. I really like how it is broken down in age groups, which helps you to understand how children become more sophisticated in their Internet use. Thanks Steve for sharing it!
anonymous

Harvard Study Finds Teens Online Lack Ethics - 10 views

  •  
    Harvard researchers studying the ethical sensibilities of youth have found that most young people are devoid of ethical thinking or consideration for others when using the web.
Anne Bubnic

What to Do If Hackers Steal Your Online Accounts - 5 views

  •  
    Stolen accounts-caused by aggressive phishing attacks and distribution of malicious programs to collect passwords-have become a plague upon the Web. Spammers want them so their messages can get past spam filters. And crooks, who often lock out the true owners by changing their passwords, use them to find and get inside financial accounts or to impersonate the owners and weasel money out of their friends.
Anne Bubnic

The unvarnished truth about unsecured Wi-Fi - 2 views

  •  
    This article outlines the dangers of using unsecured WIFI networks both at home and with others. Hackers can access and capture sensitive data over your network.
Anne Bubnic

6 Tips for Facebook Security [Video] - 4 views

  •  
    Video produced by AVG Internet Security. Offers great privacy tips, scenarios and think-abouts for kids. Uses humor and exaggeration to make the point.
Anne Bubnic

Teens and Mobile Phones: Exploring safety issues - 2 views

  •  
    In this talk, presented at the Family Online Safety Institute's annual conference (Nov 2010), senior research specialist Amanda Lenhart discussed Pew Internet data about how teens use mobile phones and the potential safety issues associated with them. The presentation was based on the April 2010 study by PEW on Teens and Mobile Phones. See: http://pewinternet.org/Reports/2010/Teens-and-Mobile-Phones.aspx
Anne Bubnic

The Kids are Alright [Study of Privacy Habits] - 4 views

  •  
    An October 2010 study of the privacy habits of parents and their teens on social networks, conducted by TRUSTe, one of the foremost authorities on online privacy. Data suggests that the majority of teens use privacy controls on social networks and that most parents actively monitor their teen's privacy. However, there is still room for improvement a some privacy areas were identified where teens are at risk on social networks. There are some good videos on this site including parents and teens talking about privacy issues.
Anne Bubnic

Digital Lifestyle Youth Culture Profile Report 2008 - 0 views

  • For example, miniDV cameras are not only among the new tools of self-expression, but the very act of creating personal videos with friends and creating events and key themes to shoot have become key aspects of entertainment in and of itself. To this generation, playing music via your cell phone, and movies and TV shows via your iPod are a given. Emailing is considered too old-school by many, whereas texting is outpacing cell phone calls. These things also go hand-in-hand with changes in online shopping patterns, top website preferences, communication and blogging patterns, and new habits for using social networks—not to mention the tremendous changes in preferred social networks and profile page usage patterns in general. These things are changing the paradigm of how the businesses of entertainment, communication, retail, marketing, advertising, and branding have been done in the past.
  • Unfortunately, as more companies pour big money into expanding their new media marketing components, as many people have discovered, the Field of Dreams theory (“if we build it, they will come”) certainly doesn’t apply when it comes to reaching savvy youth today. Popping up a site (or social network for that matter) no matter how cool it is means nothing if you can’t reach the market it’s intended for. This Report, therefore, also includes a great deal about how young people find out about new websites, communicate with others, and other forms of grassroots networking.
  • Overall, the Digital Lifestyle Youth Culture Profile Report 2008 not only reveals traits by target demographics, but also the growing generation gap occurring even within this generation.
  •  
    [Market Research Report]

    "Young people are the inherent trend leaders when it comes to new technology and usage patterns, and are the ones pushing forward the speed of change in communication and information technology. This Report reveals that it may be imperative for some brands to re-think strategies--even among progressive companies--if they are to reach youth culture effectively.
Anne Bubnic

New mobile cyber safety in Florida - 0 views

  •  
    Smart Attorney General in Florida!!! Nailed a vendor on cyberfraud charges and translated it into $1 million for Cybersafety Education programs!
Anne Bubnic

Picture Your Name Here [Facebook] - 0 views

  • Campaigns to educate students about the pitfalls of Facebook — how professors, parents and prospective employers can use the social networking site to uncover information once considered private — have become a staple of freshman orientation sessions and career center clinics. Students are apparently listening.
  • If I’m holding something I shouldn’t be holding, I’ll untag,” says Robyn Backer, a junior at Virginia Wesleyan College. She recalls how her high school principal saw online photos of partying students and suspended the athletes who were holding beer bottles but not those with red plastic cups. “And if I’m making a particularly ugly face, I’ll untag myself. Anything really embarrassing, I’ll untag.”
  •  
    Teens and college students living the party life have discovered they may have a little too much information up on their web site. De-tagging - removing your name from a Facebook photo - has become an image-saving step in the college party cycle. "The event happens, pictures are up within 12 hours, and within another 12 hours people are de-tagging," says Chris Pund, a senior at Radford University in Virginia.
Anne Bubnic

Webware 100 Awards 2008 - 0 views

  •  
    These are the 100 best Web 2.0 applications, chosen by Webware readers and Internet users across the globe. Over 1.9 million votes were cast to select these Webware 100 winners. How many of them do YOU use!
Anne Bubnic

China to Limit Web Access During Olympic Games - NYTimes.com - 0 views

  • Since the Olympic Village press center opened Friday, reporters have been unable to access scores of Web pages — among them those that discuss Tibetan issues, Taiwanese independence, the violent crackdown on the protests in Tiananmen Square and the Web sites of Amnesty International, the BBC’s Chinese-language news, Radio Free Asia and several Hong Kong newspapers known for their freewheeling political discourse.
  • The restrictions, which closely resemble the blocks that China places on the Internet for its citizens, undermine sweeping claims by Jacques Rogge, the International Olympic Committee president, that China had agreed to provide full Web access for foreign news media during the Games. Mr. Rogge has long argued that one of the main benefits of awarding the Games to Beijing was that the event would make China more open.
  • But a high-ranking Olympic committee official said Wednesday that the panel was aware that China would continue to censor Web sites carrying content that the Chinese propaganda authorities deemed harmful to national security and social stability.
  • ...1 more annotation...
  • In its negotiations with the Chinese over Internet controls, the Olympic committee official said, the panel insisted only that China provide unregulated access to sites containing information useful to sports reporters covering athletic competitions, not to a broader array of sites that the Chinese and the Olympic committee negotiators determined had little relevance to sports. The official said he now believed that the Chinese defined their national security needs more broadly than the Olympic committee had anticipated, denying reporters access to some information they might need to cover the events and the host country fully. This week, foreign news media in China were unable to gain direct access to an Amnesty International report detailing what it called a deterioration in China’s human rights record in the prelude to the Games.
  •  
    The International Olympic Committee failed to press China to allow fully unfettered access to the Internet for the thousands of journalists arriving here to cover the Olympics, despite promising repeatedly that the foreign news media could "report freely" during the Games, Olympic officials acknowledged Wednesday.
Anne Bubnic

Libraries booking young video gamers - 0 views

  • The American Library Association has announced a new project funded with a $1 million grant from the Verizon Foundation, the charitable branch of Verizon Communications.
  • Libraries that already have mature gaming systems in place will be studied to gauge how electronic games improve players' literacy skills. Then, a dozen leading national gaming experts, including a Tucson librarian, will build a tool kit that libraries across the country can use to develop gaming programs.
  • There's growing evidence that games in general, from the traditional board versions to electronic and online ones, support literacy and 21st-century learning skills, she said, though libraries have been slow to capitalize on them.
  • ...2 more annotations...
  • for the first time ever this year, the American Library Association's annual conference had a gaming pavilion, showcasing efforts to reach a demographic — tweens, teens and 20-somethings — that's tough to pull into the library.
  • Then there's just the overall focus on puzzle-solving, Danforth noted. Unlike books, games often have multiple story lines, depending on decisions that gamers make along the way. In the overall scheme of things, deploying a warrior for one job and a wizard for another isn't that much different from a boss sending an engineer out for one task and a public relations professional for another.
  •  
    If you made a list of sounds you might hear at your local library, the rumbling of explosions and the loud hum of race-car engines probably wouldn't rank high on it. But in a darkened room at the Quincie Douglas Branch Library, about 20 preteens and teens gather around two screens. It's a mostly soundproof room, to make sure their efforts to rack up points on Nintendo's Wii and PlayStation 2 don't bother the consumers of decidedly more static media. It's a sight that could become more frequent at a library near you.
Anne Bubnic

Protecting Your Online Identity and Reputation - 0 views

  • Remember that nothing is temporary online. The virtual world is full of opportunities to interact and share with people around the world. It's also a place where nothing is temporary and there are no "take-backs." A lot of what you do and say online can be retrieved online even if you delete it — and it's a breeze for others to copy, save, and forward your information.
  • Mark your profiles as private. Anyone who accesses your profile on a social networking site can copy or screen-capture information and photos that you may not want the world to see. Don't rely on the site's default settings. Read each site's instructions or guidelines to make sure you're doing everything you can to keep your material private.
  • Safeguard your passwords and change them frequently. If someone logs on to a site and pretends to be you, they can trash your identity. Pick passwords that no one will guess (don't use your favorite band or your dog's birthday; try thinking of two utterly random nouns and mixing in a random number), and change them often. Never share them with anyone other than your parents or a trusted adult. Not even your best friend, boyfriend, or girlfriend should know your private passwords!
  • ...6 more annotations...
  • Don't post inappropriate or sexually provocative pictures or comments. Things that seem funny or cool to you right now might not seem so cool years from now — or when a teacher, admissions officer, or potential employer sees them. A good rule of thumb is: if you'd feel weird if your grandmother, coach, or best friend's parents saw it, it's probably not a good thing to post. Even if it's on a private page, it could be hacked or copied and forwarded.
  • Don't respond to inappropriate requests. Research shows that a high percentage of teens receive inappropriate messages and solicitations when they're online. These can be scary, strange, and even embarrassing. If you feel harassed by a stranger or a friend online, tell an adult you trust immediately. It is never a good idea to respond. Responding is only likely to make things worse, and might result in you saying something you wish you hadn't.
  • Take a breather to avoid "flaming." File this one under "nothing's temporary online": If you get the urge to fire off an angry IM or comment on a message board or blog, it's a good idea to wait a few minutes, calm down, and remember that the comments may stay up (with your screen name right there) long after you've regained your temper and maybe changed your mind.
  • Learn about copyrights. It's a good idea to learn about copyright laws and make sure you don't post, share, or distribute copyrighted images, songs, or files. Sure, you want to share them, but you don't want to accidentally do anything illegal that can come back to haunt you later.
  • Check yourself. Chances are, you've already checked your "digital footprint" — nearly half of all online users do. Try typing your screen name or email address into a search engine and see what comes up. That's one way to get a sense of what others see as your online identity.
  • Take it offline. In general, if you have questions about the trail you're leaving online, don't be afraid to ask a trusted adult. Sure, you might know more about the online world than a lot of adults do, but they have life experience that can help.
  •  
    Advice for teens from www.kidshealth.org. Here are some things to consider to safeguard your online identity and reputation:
    1. Remember that nothing is temporary online
    2. Mark your profile as private.
    3. Safeguard your passwords and change them regularly.
    4. Don't post inappropriate or sexually provocative pictures or comments.
    5. Don't respond to inappropriate requests
    6. Take a breather to avoid "flaming."
    7. Learn about copyrights.
    8. Check your digital footprint.
    9. Take it offline.
Anne Bubnic

California Considers Anti-Cyberbully Bill - 0 views

  • A California government-sanctioned review of the bill notes inspiration from the National Association of Attorneys General (NAAG) Task Force on School and Campus Safety, which published a report suggesting schools increase their prevention activities against bullying in any form, “including cyber bullying.”
  • “The growth in the use of technology and social networking sites by younger Americans has fueled a fear among professionals that cyber bullying will become the means most often utilized to harass,” reads the report. “while certainly more prevalent in the elementary and secondary school setting, issues related to bullying or intimidation are increasingly relevant in other nontraditional settings.”
  •  
    Lawmakers in California are considering a bill to punish bullies that harass fellow student via digital means, such as test messages or social networks like MySpace.
Anne Bubnic

Three in four parents spy on children online - 0 views

  •  
    Children as young as eight are being attracted to social networking sites such as Facebook, Myspace and Bebo, with a new study revealing more than 750,000 between the ages of 8 and 12 use one, despite minimum age restrictions of 13 or 14. Parents have admitted to spying on their children online in an attempt to safeguard them from the dangers of social networking websites.
Anne Bubnic

Schools Must Deal with Students Who Use Cyberspace for Bullying - 0 views

  •  
    Ohio State Bar Association questions and answers on cyberbullying in the schools.
Anne Bubnic

Twitter and Plurk: What Parents Should Know - 0 views

  • While there is nothing inherently dangerous in the sites themselves, there is the risk that teens could use microblogs to reveal personal information or engage in a relationship with someone whose intentions are less than honorable. And like any other form of communication, the door is open for a teen to take risks such as talking about sex with strangers (albeit in relatively short bursts) or getting together with someone they meet through a microblog.
  •  
    Services like Twitter and Plurk let people post very short messages (140 characters or less) to their friends and acquaintances. Founded in 2006, Twitter has attracted millions of users who keep people posted about what they're doing and thinking. It can be as simple as "I'm standing in line at the grocery store" to as profound as a quick comment about a political candidate, a world event or a new book. There's even a video spin-off of this concept called 12 Seconds that allows people to post video clips no longer than 12 seconds.
« First ‹ Previous 781 - 800 of 1066 Next › Last »
Showing 20 items per page