The Complete Layman's Guide to Cyber Safety - 0 views
Children Online: Getting Younger and Continuing to Take Risks - 0 views
-
16% posted personal interests 15% posted information about their physical activities 20% gave out their real name 5% posted information about their school 6% posted their home address 6% posted their phone number 9% posted a photograph of themselves
-
A 2007-2008 research study conducted by Rochester Institute of Technology (RIT) reported several key findings that indicate children are logging on to the Internet at a very young age. Parental supervision of this computer activity, however, is generally lax. Not surprisingly, the study found that children are communicating with friends, peers, and others online in ways that show a lack of knowledge in what is ethical, safe behavior.
Understanding the Benefits and Risks of Texting [BNetSavvy] - 0 views
-
Texting is a form of wireless communication where users send or receive short, digital messages electronically. Texting is also known as SMS (Short Message Service). Although the bulk of texting is done via mobile-to-mobile devices, websites and companies are also jumping on the bandwagon. Some companies allow users to "web text" by sending and receiving text messages to mobile devices from their computers. Many provide the service for free. Text messaging is an extremely popular method of communication. CTIA-The Wireless Association®, the international association for the wireless telecommunications industry, reported that over 48 billion text messages were sent in a one-month period in 2007, which averages 1.6 billion messages per day.
The Internet Protectors Launches First Online Cybersecurity Information Community - Tec... - 0 views
-
The Internet Protectors(TM) today opened its doors to computer users looking for non-technical help in learning about and protecting themselves against the security risks that plague Internet users today. The Internet Protectors (TIP) website (http://www.TheInternetProtectors.com) provides a neutral environment where users can ask questions of topic experts, research different aspects of security in a library of podcasts, videos, and white papers, read and subscribe to blogs on multiple security topics, discuss security issues in forums, and more.
Technology: Cyber Security - 0 views
How To Stop Cyber-Bullying - 0 views
-
Yet with so many different types of cyberbullying, ranging from online impersonation to e-mail hacking and distributing embarrassing materials about a person, it can be difficult for kids, let alone those trying to help them, to know how to respond and stop the 21st century bully in his or her tracks. "Awareness about the issue is high, but awareness about what to do when it happens is mixed," says Michele Ybarra, president and research director for Internet Solutions for Kids (ISK) and an adjunct faculty member at Johns Hopkins School of Public Health.
-
Research suggests that those on the receiving end of traditional bullying may be more likely to cyberbully as a form of retaliation. Kids involved in the more severe instances of cyberbullying also tend to have more psychosocial problems, exhibiting aggression, getting in trouble at school and having poor relationships with their parents, says Nancy Willard, an expert on cyberbullying and author of Cyberbullying and Cyberthreats. And while traditional bullying appears to peak in middle school and drop off as kids reach high school, cyberbullying tends to slightly increase among kids in high school, a trend researchers can't yet explain.
-
One of the tricky things about helping cyberbullying targets is that they aren't always willing to talk about the problem. Teens often cite a fear of having their Internet privileges revoked as a reason for keeping quiet, Agatston says. Kids who receive threatening messages in school may not divulge what's happened for fear of getting in trouble, since many schools ban use of cellphones during the day. To get around that problem, Willard recommends having a frank discussion with your children about cyberbullying before it happens.
- ...1 more annotation...
-
Kids can be mean.\n\nIt's a fact of life we've all experienced. Gone are the days, however, when avoiding a bully meant ducking out of the back door at school. Thanks to personal computers, cellphones and instant messaging, it's now easier than ever for children to attack each other, often anonymously.
Tech Literacy Confusion: What should you measure? - 0 views
-
Teaching literacy-reading and writing-is a core mission for schools, but today's young people increasingly "read" 3-D computer simulations and "write" via social networks such as Facebook. A growing chorus of experts say schools should add these forms of communication to their literacy mission as "technology literacy."
Tips for Dealing with Cyberbullies - 0 views
Flash Animations and Video Cybersafety Lessons - 0 views
A School That's Too High on Gizmos - 0 views
-
"Technolust" -- a disorder affecting publicity-obsessed school administrators nationwide that manifests itself in an insatiable need to acquire the latest, fastest, most exotic computer gadgets, whether teachers and students need them or want them. Technolust is in its advanced stages at T.C., where our administrators have made such a fetish of technology that some of my colleagues are referring to us as "Gizmo High."
Ten Challenges for the Network Age -- Part One - Practical Theory - 0 views
-
The challenge for education "How do we handle the abundance of inputs and outputs available to our students given the scarcity of two major problems in our schools: Allowed / Accepted Channels of Access (number of computers per child, bandwidth, filtering, restrictions on publishing, etc...) and time. \n
B4UCopy - 1 views
-
From the Business Software Alliance (BSA.) Computers make it easy to make copies of computer software, pictures, words, movies and songs. But copyright laws make it illegal to copy the creative work without the owner's permission. Making copies of a work protected by copyright is just like stealing. The B4UCopy educational curriculum program, available for free download, has a goal of raising awareness of copyright laws and reinforce responsible behavior online.
staysafe.org for Teens - 0 views
Playing it Safe - 0 views
AUPs in a Web 2.0 World - 0 views
Pandora 6.0 Computer Monitoring Software Will Help Parents Teach And Enforce Cybersafet... - 1 views
-
Discussion between parents and children is the best way to create trust. But computer use especially by new users can not be expected to be "private" from their parents. Filtering has its place, but should be used to generate trust and not access blame or perjorative measures. Students will always find a way to circumvent filtering and internet restriction. What are you're opinions? Has anyone used PC Pandora 6? Ray http://www.google.com/profiles/Raymond.WM.Lai#buzz
Online Safety 3.0: Empowering and Protecting Youth - 2 views
-
Online Safety 3.0 enables youth enrichment and empowerment. Its main components - new media literacy and digital citizenship - are both protective and enabling. Ideally from the moment they first use computers and cellphones, children are learning how to function mindfully, safely and effectively as individuals and community members, as consumers, producers, and stakeholders. The kind of online well-being we identify as "online safety" isn't logically something completely new and different added on to parenting and the school curriculum.
Safe Travels for You and Your Data - 4 views
« First
‹ Previous
61 - 80 of 135
Next ›
Last »
Showing 20▼ items per page
Part I: How online crooks put us all at risk
Part II: How well are we protecting ourselves?
Part III: U.S. targets terrorists as online thieves run amok