Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged e-mail

Rss Feed Group items tagged

Anne Bubnic

Are texting, other media replacing e-mail? - 0 views

  •  
    A pair of 2007 studies conducted by the Pew Internet & American Life Project showed that teens are steadily drifting away from the "old-fashioned medium" of e-mail. While 92 percent of surveyed adults said they regularly used e-mail, only 16 percent of teens made it a part of daily life while text messaging (36 percent), instant messaging (29 percent) and social network site messaging (23 percent) gained in popularity. As teens, 20-somethings and, increasingly, other generations bypass their in-box in favor of other formats, is e-mail endangered?
Anne Bubnic

The Millennials Are Coming! - 0 views

  • Most agencies manage sensitive citizen data: addresses, Social Security numbers, financial records and medical information. You name it, some state or local office has it, and probably electronically. The problem? Many theorize that the Millennials' penchant for online openness could unintentionally expose private information, leaving it ripe for the picking. Millennials bring innovative ideas about technology's use, but for that same reason, do they also pose new security risks?
  • Anti-virus vendor Symantec released a study in March 2008 assessing this issue. Symantec commissioned Applied Research-West to execute the study, and 600 participants were surveyed from different verticals, including government. Survey participants included 200 IT decision-makers, 200 Millennial workers and 200 non-Millennial workers born before 1980. The data revealed that Millennials are more likely than workers of other ages to use Web 2.0 applications on company time and equipment. Some interesting figures include: 69 percent of surveyed Millennials will use whatever application, device or technology they want at work, regardless of office IT policies; and only 45 percent of Millennials stick to company-issued devices or software, compared to 70 percent of non-Millennials.
  • How might young people be workplace assets? Could all that time typing or texting make them speedy typists, able to whip up memos at the drop of a hat? Does familiarity with new and emerging technologies have its benefit? You bet, according to Dustin Lanier, director of the Texas Council on Competitive Government. The council brings state leaders together to shape policy for government departments, including IT. "I think they've built an approach to work that involves a lot of multitasking," Lanier said of the Millennials. "Something will be loading on one screen, you alt-tab to another application and pull up an e-mail, the first process loads, you flip back, start a new process, flip to a forum and pull up a topic. It's frenetic but normal to that group." Lanier doesn't think Millennials present more of an IT threat than their older co-workers. After all, young people don't have a monopoly on being distracted in the office. "I can't tell you how many times I've walked by people's desks of all ages and seen Minesweeper up," he said. He thinks employers should embrace some Web 2.0 applications. Otherwise, Millennials might be discouraged from sticking around. According to Lanier, this younger work force comprises many people who think of themselves as free agents. Government should accommodate some of their habits in order to prevent them from quitting.
  •  
    Get ready CIOs. They're coming. They have gadgets and doohickeys galore. They like their music downloadable and portable, and they grew up with the Internet, not before it. Their idea of community is socializing with people in other cities or countries through Facebook, MySpace or instant messages, and they use e-mail so often they probably think snail mail is an endangered species. They're the Millennials - those tech-savvy, 20-somethings and-under bound to warm up scores of office chairs left cold by retiring baby boomers. There's a good chance many will come to a government workplace near you, but their digital literacy could prove worrisome for security-conscious bosses.
Anne Bubnic

What you should know about phishing identity-theft scams [Video] - 0 views

  •  
    Watch this excellent video from Microsoft to find out more about phishing e-mail scams and how they are used for identity theft. The video will show you how fraudulent e-mail messages and spoofed Web sites-two common forms of phishing-can trick you into s
Anne Bubnic

Cyber Safety/Social Networking Safety Measures - 0 views

  • For the past two years Blumenthal and other states' attorneys general have negotiated with both Facebook and MySpace to implement more than 60 new safety measures to protect children from online predators and from gaining access to inappropriate content, like pornography.
  • Under the agreement with Facebook, its officials have agreed to prominently display safety tips, and to require users under the age of 18 to affirm that they have read the tips. Users over 18 can no longer search for under-18 users, and Facebook officials will automatically be notified when someone under 18 is in danger of providing personal information to an adult user.
  • Parents will also be provided with tools to remove a child's profile from the site. Inappro­priate images and content will be removed, and ads for age-restricted products, like alcohol and tobacco, will be limited to users old enough to purchase those items. Most significantly, Facebook agreed to diligently search for and remove profiles of registered sex offenders, and it will "in­crease efforts to remove groups for incest, pedophilia, cyber-bullying and other violations of the site's terms of service and expel from the site individual violators of those terms."
  • ...2 more annotations...
  • Under the agreement, MySpace now allows parents to submit their child's e-mail address to prevent anyone from using that e-mail address to set up a profile (e-mail addresses are required in order to set up an account for either Facebook or MySpace, and people may search for "friends" by entering e-mail addresses). For anyone under 16, MySpace will automatically set the profile to "private," allowing only approved people to view the profile. There is now a closed "high school" section of the site set aside for users under 18.
  • Like Facebook, MySpace officials will also "obtain and constantly update a list of pornographic Web sites and regularly sever any links" between the sites. MySpace agreed to provide a way to report abuse on every page that contains content. The site's officials also prom­ised to respond to complaints of inappropriate content within 72 hours.
  •  
    Connecticut Attorney General Richard Blumenthal has made it one of his priorities to install methods of protection for the state's children when it comes to using these Web sites, hoping to "make social networking safer," according to a press release generated by his office. Efforts by Facebook and MySpace to protect privacy are described in this article.
Anne Bubnic

ReadWriteThink: Online Profile: Learning Beyond the Classroom - 0 views

  •  
    n this activity, teenagers explore online names by looking at sample e-mail addresses to determine what they can tell about the person who uses the account. After this exploration, teens choose a screen name or e-mail address for themselves as well as decide on personal details to include on a safe online profile.
Anne Bubnic

i-SAFE Lesson Guide: Phishing for Information - 0 views

  •  
    Download this lesson plan from I-Safe which introduces students to the term phishing and the threat of identity theft associated with this type of e-mail. Students will:
    *understand the term phishing and the types of e-mail it applies to
    * understand the security risks associated with this type of message
    *engage in an activity to reinforce concepts by sharing information with others
Anne Bubnic

ReadWriteThink: Creating A Safe Online Profile - 0 views

  •  
    In this activity, teenagers explore online names by looking at sample e-mail addresses to determine what they can tell about the person who uses the account. After this exploration, teens choose a screen name or e-mail address for themselves as well as decide on personal details to include on a safe online profile.
Anne Bubnic

Don't Hit That 'Delete' Button!: Email Archiving - 0 views

  • The FRCP now treats electronic documents no differently from paper-based documents," explains John LoPorto, executive vice president of sales and marketing for electronic archiving and security provider Privacy Networks. So should corporations, organizations, or schools ever have to participate in a court case involving federal violations such as copyright infringement, sexual harassment, unsafe work environments, or fraud, their e-mails will be considered as possible evidence. "Hence the need to save e-mail," says LoPorto.
  •  
    In response to new federal rules mandating organizations retain their electronic documents, districts are using outside providers to archive their in-house e-mails.
Anne Bubnic

Student Sues her Coach for violating her privacy rights on Facebook. - 0 views

  •  
    A former high school cheerleader is suing her former coach and the school district for $100 million after the coach allegedly read personal e-mails, WAPT-TV reported. The student filed the federal lawsuit after she said her coach got into her Facebook account and read the messages. One of the e-mails was between the student and another cheerleader and had profanity.
Anne Bubnic

Thx 4 the gr8 intrvu! - 0 views

  • Hiring managers like Johnson say an increasing number of job hunters are just too casual when it comes to communicating about career opportunities in cyberspace and on mobile devices. Thank-yous on paper aren't necessary, but some applicants are writing e-mails that contain shorthand language and decorative symbols, while others are sending hasty and poorly thought-out messages to and from mobile devices. Job hunters are also using social-networking sites like Facebook and MySpace to try to befriend less-than-willing interviewers.
  •  
    After interviewing a college student in June, Tory Johnson thought she had found the qualified and enthusiastic intern she craved for her small recruiting firm. Then she received the candidate's thank-you note, laced with words like "hiya" and "thanx," along with three exclamation points and a smiley-face emoticon. "That e-mail just ruined it for me," says Johnson, president of New York-based Women For Hire Inc. "This looks like a text message."
Anne Bubnic

Federal Law Mandates E-Mail Archiving - 0 views

  •  
    The 2006 amendment to the Federal Rules of Civil Procedure requires that public entities, including school districts, be able to produce electronically stored information from staff members, such as e-mail and other digital communications, during the " discovery process" in lawsuits.
Judy Echeandia

Kansas State University Survey Delves into Cyberbullying - 0 views

  • A survey of more than 200 Kansas State University students — mostly freshmen — indicates 54 percent of them believe cyberbullying is a "minor problem" or a "common problem" among students at the university.
  • The survey used the cyberbullying definition provided in Kansas' anti-bullying law, which took effect in January 2008 and was revised in July to include cyberbullying. The law requires schools to develop anti-bullying policies, plans and preventative measures. Cyberbullying is the use of any electronic communication device, such as e-mail, instant messaging, text messages, blogs, mobile phones, pages, online games or Web sites, to create an intimidating, threatening or abusive environment.
  •  
    An online bullying survey was completed by 216 students - 93.7 percent were freshmen- enrolled in the University Experience classes at Kansas State University. The goal of the survey was to determine if bullying behavior followed students from high school into college and how freshmen perceived bullying. The survey used the cyberbullying definition provided in Kansas' anti-bullying law, which took effect in January 2008 and was revised in July to include cyberbullying. The law requires schools to develop anti-bullying policies, plans and preventative measures. Cyberbullying is the use of any electronic communication device, such as e-mail, instant messaging, text messages, blogs, mobile phones, pages, online games or Web sites, to create an intimidating, threatening or abusive environment.
Anne Bubnic

Putting a Price on Social Connections - 0 views

  • Researchers at IBM and MIT have found that certain e-mail connections and patterns at work correlate with higher revenue production
  •  
    Researchers at IBM and MIT have found that certain e-mail connections and patterns at work correlate with higher revenue production
Anne Bubnic

1 in 5 teens 'sext' despite risks - 0 views

  •  
    A new survey on kids in cyberspace finds that one in five teens have "sexted" - sent or received sexually suggestive, nude or nearly nude photos through cellphone text messages or e-mail. Most teens who sexted sent the photos to girlfriends or boyfriends, but 11% sent them to strangers, according to the study made public today by the National Center for Missing & Exploited Children and Cox Communications. Of teens who sext, 80% are under 18, the survey found.
  •  
    A new survey on kids in cyberspace finds that one in five teens have "sexted" - sent or received sexually suggestive, nude or nearly nude photos through cellphone text messages or e-mail.Most teens who sexted sent the photos to girlfriends or boyfriends, but 11% sent them to strangers, according to the study made public today by the National Center for Missing & Exploited Children and Cox Communications. Of teens who sext, 80% are under 18, the survey found.
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • ...3 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Anne Bubnic

Will textbooks go the way of typewriters? - 0 views

  •  
    For anyone who attended college before the era of e-mails and the Internet, the notion that bulky textbooks could someday become obsolete might seem ludicrous. Yet with a wealth of information on virtually any topic now readily accessible online, more people are starting to ponder if these hefty staples of education will remain relevant.
Anne Bubnic

As 'Trolling' Turns More Vicious, What, If Anything, Can Stop It? - 0 views

  •  
    One afternoon in the spring of 2006, for reasons unknown to those who knew him, Mitchell Henderson, a seventh grader from Rochester, Minnesota, took a .22-caliber rifle down from a shelf in his parents' bedroom closet and shot himself in the head. The next morning, Mitchell's school assembled in the gym to begin mourning. His classmates created a virtual memorial on MySpace and garlanded it with remembrances. One wrote that Mitchell was a "hero to take that shot, to leave us all behind. God do we wish we could take it back." Someone e-mailed a clipping of Mitchell's newspaper obituary to MyDeathSpace.com, a Web site that links to the MySpace pages of the dead.
Anne Bubnic

Terror in the Classroom: What Can Be Done?, Part 3 - 0 views

  • Of those that reported that they had been cyberbullied, over 50 percent reported the cyberbullying lasted on average 2-4 days, while approximately 30 percent lasted a week or longer. Over 41 percent of the time cyberbullying took place with instant messaging, chat rooms and blogs (MySpace, Xanga, Facebook, Bebo, etc). In addition, 35 percent reported that e-mail was used to cyberbullied them.
  • ngry, depressed and hurt were the top three emotions experienced
  • he most reported reasons those that admitted to cyberbullying (14/59) gave were out of revenge (57 percent) and anger (43 percent) while 21 percent admit to cyberbullying because they did not like the other person. When asked how the cyberbullying take place, the results are similar to the ones reported by victims of cyberbullying: 43 percent by instant messaging or chat rooms and 36 percent by e-mails or blogs
  •  
    A Look At The Cyberbully. This study confirms other studies (Opinion Research, (2006) on the prevalence of cyberbullying in that about a third (29%) admitted to being bullied with half of them reporting that additional bullying accompanied the initial cyberbullying. Research finds a connection between bullies, cyberbullies and their victims. Bullies, compared to non-bullies, were more likely to be cyberbullies; while victims of physical bullying were more likely to be victims of cyberbullying
Anne Bubnic

Cyberbullying Policy: Harrass others and Lose Your Driver's License! - 0 views

  • In the past, the Medford district had used its umbrella policy on bullying, harassment and intimidation to crack down on cyber bullying.Spelling out the ban on cyber bullying and threatening to suspend driving privileges sends out a clear message that school officials are on the watch for such behavior, officials said.
  •  
    Medford School District takes Cyberbullying seriously. In a new update to their board policy, students who use text messages or e-mails to harass schoolmates could lose their driver's licenses. Apparently, this policy has also been used for chronic truancy offenses. Prior to this new update, the school board policy on cyberbullying was already one that strongly articulated zero-tolerance for bullying in cyberspace.
Anne Bubnic

The Future of Children: Children and Electronic Media - 0 views

  •  
    Media technology is an integral part of children's lives in the twenty-first century. The world of electronic media, however, is changing dramatically. Television, until recently the dominant media source, has been joined by cell phones, iPods, video games, instant messaging, social networks on the Internet, and e-mail.This volume examines the best available evidence on whether and how exposure to different media forms is linked to child well-being. Contributors to the volume consider evidence for both children and adolescents and consider the quality of the available studies.
1 - 20 of 49 Next › Last »
Showing 20 items per page