Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged home

Rss Feed Group items tagged

abinayaseo

The Remarkable relationship between building a New Website and House - 0 views

  •  
    We had a long way to go about precisely what`s required with the development of a home yet, as we began to get into the swing of things we understood that building a house is really a great deal like building a site. Give me a chance to clarify.
syukron nuryadi

SAMSUNG GALAXY CENTU - 0 views

image

samsung manual galaxy

started by syukron nuryadi on 19 Apr 14 no follow-up yet
Anne Bubnic

SecretBuilders: Virtual World for Young Children - 5 views

  •  
    SecretBuilders is a virtual world for children 5 to 14 years old powered by a web 2.0 community of children, parents, educators, writers, artists and game developers. On SecretBuilders, kids explore virtual lands, undertake quests, play games, maintain a home, nurture a pet, and interact with their friends.
Anne Bubnic

Cyberbullying WebQuest - 0 views

  •  
    This WebQuest was designed for 5th - 8th grade students. It could be used as part of a technology class, home room, or social studies class. Cyberbullying is a growing issue in schools. By helping students research the issues around cyberbullying, the process alone it will raise awareness levels. Student recommendation from this WebQuest should be taken to the School Board. Students need to know that voice will be heard. Policy or handbook changes they recommend can actually be done.
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • ...3 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Anne Bubnic

Cyberbully Crackdown At Montclair School District - 0 views

  •  
    A Montclair school district is trying to protect its students from cyber bullies, even when they attack from home. CBS has learned how the school is cracking down and making the bullies the target.
Anne Bubnic

Parents learn how to safeguard children against portable pornography - 0 views

  • Along with marketed content for the PlayStation Portable, Nicolakis said Playboy started a service called iBod. The service started in 2005 and allows users to download soft porn to their device. Wallpaper of nude photos and explicit ring tones are some of the other materials available through built-in Web browsers in portable devices like the iPhone, Nicolakis said, and parental safeguards are nonexistent or just now becoming available. He said another avenue for pornographic material is user-generated photos or videos sent from cell phone to cell phone. Teens are reportedly taking sexually explicit photos of themselves and sending them to friends, but the images can easily be sent without consent to others, Nicolakis said. "That's child pornography, and that's a felony," he said. "If you think you're immune to it here in Modesto, you're wrong. It's probably already happened, you just don't know yet.
  •  
    Diane Hillas considers herself illiterate when it comes to technology, so she was surprised to hear her 12-year-old son's PlayStation Portable game console can be used to download Internet pornography. The 51-year-old Modesto mother of three was at a cyber safety seminar at Modesto's Greek Orthodox Church of the Annunciation on Saturday afternoon, and said she would check every portable communication device her family owns once she got home.
Grace Kat

websafety4kids / - 1 views

  •  
    Welcome to Web Safety For Kids, a wiki setup to support presentations for parents about Internet safety. It contains links to a range of resources that parents may find helpful in a dealing with their children's use of the Internet at home.
Anne Bubnic

Cyber Bullying Presents a Complex Legal Landscape - 0 views

  • Cyber bullying conducted at school allows school authorities to more easily impose discipline. The use of school equipment to cyber bully also makes a stronger legal argument for action by the school. And if the student e-mails offensive speech to school or downloads it at school and then distributes it, the school is in an advantageous position regarding disciplining the student. However, speech created at home—such as the creation of a Web site—affords greater legal protection for cyber bullies.
  • “The problem with the approach that web speech created at home can—if accessed at school—become school speech that can be regulated is the very nature of the Internet. Once something is created and placed on the Internet, the author loses control over who can access the speech and where it can be accessed.”
  •  
    As students across the country return to school, school districts face an often complicated and confusing legal landscape on how to deal with cyber bullies in their schools, according to Todd DeMitchell, EdD, a professor of education, who studies school liability, adequate supervision, and responses to preventing bullying and cyber bullying from school administrators and state legislatures.
Anne Bubnic

From MySpace to Hip Hop, A MacArthur Forum, Part 2 - 0 views

  •  
    From MySpace to Hip Hop, A MacArthur Forum, Part 2
    This is the second of three videos, researchers who presented their work were: Mimi Ito, University of Southern California, Participatory Learning in a Networked Society:Lessons From the Digital Youth Project;danah boyd, University of California Berkeley, Teen Socialization Practices in Networked Publics; Heather Horst, University of California Berkeley, Understanding New Media in the Home; Dilan Mahendran, University of California Berkeley, Hip Hop Music and Meaning in the Digital Age.
Anne Bubnic

Cyberbullying The Real Threat on the Digital Playground - 0 views

  • "Parents are the key to this whole issue," explains Leasure. "They need to be involved and monitoring the computer and Internet activity of their kids. If they see something that isn't right, they need to act as parents and correct the issue."
  • parental awareness is truly the key to fixing this problem. If your child is the victim - or worse, the bully - it's time to step in. it's not being over-protective; it's trying to stop the current generation from 'virtually' destroying themselves emotionally
  • Cyberbullying Statistics: A recent survey of 395 students, ages 11 to 19, was conducted by the Kids/Teen Division of the Maine-based online safety organization Working To Halt Online Abuse. The study found that: � 28% of students have been cyberbullied, but... � Just over half tell their parents or another adult about it; of the students who did not report the cyberbullying, 25% felt it wasn't a big problem or didn't want to make a big deal out of it � 65% reported the cyberbullying was via IM, followed by email, MySpace, chat rooms and online games � 43% were cyberbullied by someone their age or in the same grade � 30% blocked or deleted the cyberbully, while 16% ignored them � 54 students admitted they had bullied somebody online themselves
  •  
    While reports and stories in the media focusing on Internet predators have become all too frequent, the closer-to-home threat to our children may really be cyberbullying, also known as electronic or online bullying. A recent survey of 395 students (11 to 19 years old) found that 28% of students have been cyberbullied, and more than 1 in 7 admitted to acting as the bully."Cyberbullying could be the biggest online threat facing teens today," says James Leasure, co-founder of Pandora Corp. "Of course Internet predators do still exist, but statistically, kids have a much greater chance of being involved in some way with electronic bullying." Most cases of cyberbullying go undocumented because, fortunately, many kids are able to shrug off the 'unkind words' and look the other way. But there are some cases that make national headlines when they turn into tragedies, such as the Megan Meier case in 2006. Larger cases like this have prompted several states to adopt legislation that makes online bullying illegal.
Anne Bubnic

WEB|WISE|KIDS: MIRROR IMAGE [Interactive Software Adventure] - 0 views

  •  
    3rd in the Cybercop Series. MIRROR IMAGE tells the story of teenagers Sheena and Megan, best friends who are victimized by a criminal who uses the Internet to lure young women with promises of modeling contracts and online romance. Neither of the girls realizes that hacking software has been placed on their computers during their conversations with their 'online boyfriends.' Soon Sheena and Megan begin to suspect that someone is stalking them in real life. Players work with a detective to track the predator and arrest him. Available both as a home edition and a school edition. [Windows and Mac OSX versions available]
Anne Bubnic

WEB|WISE|KIDS: AIRDOGS [Interactive Software Adventure] - 0 views

  •  
    2nd in the CyberCop Series, AIRDOGS was designed to show teenagers that online crimes have lifelong legal and social consequences for teens and their families. In the game, Luke is a teenager who shows great promise as a snowboarder. He needs money for gear and training, so he begins to counterfeit software in his basement. Players collect data and evidence to catch Luke's boss, who is the ringleader of the operation. The message of Air Dogs is clear: theft and extortion are crimes, whether you're 16 or 60. Available both as a home edition and a school edition. [Windows and Mac OSX versions available]
Anne Bubnic

WEB|WISE|KIDS: MISSING [Interactive Software Adventure] - 0 views

  •  
    MISSING, from Web Wise Kids, is designed to SHOW rather than TELL children about online safety. It's a fun and positive way to teach children how to avoid danger on the Internet. The interactive software adventure tells the story of Zack, a kid in Vancouver, Canada who forms an online friendship with Fantasma. This guy is so cool - he has an online magazine about beach life in California and he sends Zack great stuff, like graphic arts and software. Little does Zack know that he is a predator. After Zach agrees to go to San Diego to be with Fantasma, players work with a detective to find and rescue Zack and arrest Fantasma. Available both as a home edition and a school edition. [Windows and Mac OSX versions available]. Note: Local middle school science teachers have successfully worked this program into their science curriculum since solving the game involves researching and collecting clues.
Lorna Costantini

Ideas and Thoughts from an EdTech [Blog Archive] - 0 views

  • Her reaction was to block all these sites, ban her daughter from the home computer and demand the school district to install content filtering that would prohibit any access to social networks.
    • Rafael Ribas
       
      Exactly the kind of reaction an uneducated parent would have - away from my child!
  • social networking should be taught in the homes
  • Teachers are our best filters at school
    • Rafael Ribas
       
      Hear hear! That is exactly what we need to say loud and clear
  •  
    Very interesting post by Dan Shareski on the connections between parents, school districts, students and the internet.
  •  
    podcast outlining a parent's fears about non filtering of Facebook at school
Anne Bubnic

Second Life could sexually exploit children via Internet - 0 views

  •  
    With nearly 13 million online users, the rapidly expanding virtual world Second Life is a risk for children, who could be sexually exploited, U.S. Rep. Mark Kirk (R-Ill.) said Monday."This Second Life is a new scare, unchartered territory," Wilks said at a news conference Monday with Kirk at the Mt. Prospect Police Department. "It hits home." Kirk said he knew of no cases in which children were targeted by sexual predators on Second Life, but he said he considers the virtual world an emerging danger.
Anne Bubnic

Kids outsmart Web filters - 0 views

  •  
    Web proxies are almost as old as the Internet itself as a means to route Web traffic through an anonymous domain name or circumvent content-filters, and they've long been the territory of corporate networks and the tech savvy seeking privacy. Nowadays, an increasing number of teenagers are setting up proxies on home PCs to sidestep school filtering traps, in addition to using free proxies set up on the Web, according to technologists at schools and at content-filtering technology providers.
Anne Bubnic

Memphis area students punished for fight on Web - 0 views

  •  
    Another YouTube brawl earns suspension for two girls. Two Southwind Middle School girls were suspended Monday after their locker room fight was posted on the Internet. This follows similar beatings in Indiana and Florida where the acts were committed in order to videotape the event. School principal Marcia Crouch sent a note home to parents Monday afternoon alerting them about the fight and warning them of the school district's zero-tolerance policy regarding such misbehavior.
Anne Bubnic

The Complete Layman's Guide to Cyber Safety - 0 views

  •  
    Defend your virtual home. Some pretty bad folks are trying to break into your computer all the time. But you can make it a lot harder for them.
‹ Previous 21 - 40 of 133 Next › Last »
Showing 20 items per page