Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged log

Rss Feed Group items tagged

Anne Bubnic

Dealing with the digital divide - 0 views

  •  
    Just before midnight, an eMail popped into Robert Morris University professor Chris Davis' eMail box. It was from a student. When the student did not receive an immediate reply, another eMail arrived 30 minutes later. By the time Davis logged on the following morning, he had four eMails from this student. "A lot of our younger students using technology are used to that instant gratification when they reach out and ping somebody," Davis said. "But I tell students I'm not available 24 hours a day."
Anne Bubnic

DeLand teen gets probation for threatening school assault - 0 views

  • He was originally charged with conspiracy to commit murder. On Friday, Circuit Judge Hubert L. Grimes sentenced him to probation, which could last until he turns 19. He was accused of making threats on MySpace, where his page showed a tombstone, satanic references and admiration for the shooters in the 1999 massacre at Columbine High School in Colorado, authorities said. Through instant messages on MySpace to another student, he also threatened to lock the cafeteria doors during one of the lunch periods and shoot everyone inside, authorities said.
  • boy used his MySpace page to react against the intense bullying at the middle school, which left him in fear. The boy has said that one of the bullies threatened to slit his throat.
  •  
    A 14-year old boy was accused of making threats on MySpace, where his page showed a tombstone, satanic references and admiration for the shooters in the 1999 massacre at Columbine High School in Colorado, authorities said. Through instant messages on MySpace to another student, he also threatened to lock the cafeteria doors during one of the lunch periods and shoot everyone inside, authorities said. In lieu of imprisonment, the student has been transferred to an alternative facility and is prohibited from logging onto MySpace or Facebook or making contact with students from his former school. The boy's attorney said the boy used his MySpace page to react against intense bullying at the middle school, which left him in fear. The boy has said that one of the bullies threatened to slit his throat.
Jocelyn Chappell

Social networking applications can pose security risks - Yahoo! News - 0 views

  •  
    Sensationlist new article about the fact that everytime you install an app on facebook, you give away your facebook log in details. So who keeps their bank details on facebook? You do...?! Oh, I'm sorry perhaps I shouldn't have said anything -- not.
  •  
    There is a place for caution -- but not by way of knee-jerk reaction to streams of old new like this.
Vicki Davis

Children Online: Getting Younger and Continuing to Take Risks - 0 views

  • 16% posted personal interests 15% posted information about their physical activities 20% gave out their real name 5% posted information about their school 6% posted their home address 6% posted their phone number 9% posted a photograph of themselves
    • Vicki Davis
       
      Again, education is so important of both students and parents.
  •  
    A 2007-2008 research study conducted by Rochester Institute of Technology (RIT) reported several key findings that indicate children are logging on to the Internet at a very young age. Parental supervision of this computer activity, however, is generally lax. Not surprisingly, the study found that children are communicating with friends, peers, and others online in ways that show a lack of knowledge in what is ethical, safe behavior.
Anne Bubnic

Cyber bully mentors deluged with calls from teenage victims - 0 views

  •  
    A team of online Cyber-Mentors set up to help teenage victims of bullying was deluged with calls for help at its launch yesterday. Hundreds of children and friends of victims logged on to chat to one of 700 specially trained teenagers about their problems.
Anne Bubnic

Student Fights Record of Cyberbullying - 0 views

  •  
    Katherine Evans said she was frustrated with her English teacher for ignoring her pleas for help with assignments and a brusque reproach when she missed class to attend a school blood drive. So Ms. Evans, who was then a high school senior and honor student, logged onto the networking site Facebook and wrote a rant against the teacher, Sarah Phelps.
Anne Bubnic

Logging Out after Snuffing Out - 1 views

  •  
    What happens to our digital footprint when we die? In the physical world, a will instructs friends and family what to do with money and assets. But online lives and their impact may not be taken into account.
Anne Bubnic

Please Rob Me - 3 views

  •  
    Are we TOO connected? Social networking services from Twitter and Foursquare to Yelp and Buzz encourage users to log in and share their location. Please Rob Me is a website by Forthehack that lists updates on Twitter and Foursquare from people who are telling they world that they are not home. Scary stuff and definitely something both kids (and adults) need to consider.
Anne Bubnic

Mom Hacks Facebook Account; Teen Sues - 1 views

  • It was a mixed blessing that within 24 hours of creating her Facebook page, my kid was harassed unmercifully by a so-called friend — someone she thought was a friend in real life — to the point where she had to unfriend and block other communications from them. I couldn’t have made my case any better about the dangers of social media if I’d paid the obnoxious bully to do it for me.
  •  
    A teen has sued his mother for harassment after she logged into his Facebook account and changed content. He also claims she's made "slanderous" comments about him in Facebook as well. It's important to note that this 16-year-old lives with his grandmother and not his mother, and that he appears to be old enough to drive in his home state of Arkansas.
buyverifiedets

Buy Etsy Account - Fast Delivery - Cheap & Bulk - Boost Like - 0 views

  •  
    Buy Etsy Account Introduction Having an Etsy account allows you to purchase and sell handmade things, antique items, and creative materials on the Etsy website. To shop on Etsy, you need to be logged into your Etsy account. Using your email address, Facebook account, or Google account, you may create an Etsy account. Why You Should Buy Etsy Accounts ? The American e-commerce site Etsy specializes on distinctive factory-made products as well as handcrafted or antique goods and supplies. According to reports, Etsy is the "world's largest handmade marketplace" and "a crafts bazaar." Etsy accounts are quite beneficial for a variety of reasons. Here are a few examples:
  •  
    Buy Etsy Account Introduction Having an Etsy account allows you to purchase and sell handmade things, antique items, and creative materials on the Etsy website. To shop on Etsy, you need to be logged into your Etsy account. Using your email address, Facebook account, or Google account, you may create an Etsy account. Why You Should Buy Etsy Accounts ? The American e-commerce site Etsy specializes on distinctive factory-made products as well as handcrafted or antique goods and supplies. According to reports, Etsy is the "world's largest handmade marketplace" and "a crafts bazaar."
Dean Mantz

academyofdiscovery - Internet Safety - 8 views

  • I will never post any information more personal than my first name nor will I post pictures of myself. I will not plagiarize, instead I will expand on others' ideas and give credit where it is due. I will use language appropriate for school. I will not insult my fellow students or their writing. I will only post pieces that I am comfortable with everyone seeing; other pieces I will keep as drafts. I will not be afraid to express my ideas, while not overgeneralizing or making derogatory/inflammatory remarks; any posts or edits on controversial issues must either be submitted to Mr. Wilkoff prior to posting or be a part of a classroom project/question which addresses controversial issues. I will use constructive/productive/purposeful criticism, supporting any idea, comment, or critique I have with evidence. I will take all online content creation seriously, posting only things that are meaningful and taking my time when I write. I will try to spell everything correctly. I will not use my public writing (blog posts, comments, discussion topics, wiki edits) as a chat room, instead, I will save IM language for private conversations. I will not bully others in my blog posts or in my comments. I will never access another student's account in order to pose as them or look at their personal content, but I will advise them when they haven't logged out of their computer from my own account. I will be proactive in monitoring the comments that others leave on my blog, utilizing the comment blacklist if necessary. I will personalize my blog and keep my writing authentic, while taking responsibility for anything blogged in my name. I will not provoke other students in my blog posts or comments. I will use my online content as an extension of the classroom, and in doing so, I will leave anything that unsaid in the classroom unsaid online. I will only post photos which are school appropriate and either in the creative commons or correctly cited. I will not spam (including, but not limited to meaningless messages, mass messages, and repetitive messages) I will only post comments on posts that I have fully read, rather than just skimmed. I will respect the public nature of online information, and in doing so, I will respect the wishes of my fellow students for keeping their information (full name, compromising stories, etc.) private.
Nicks Mor

Get creative web design, graphic, logo, brochure design services at affordable cost - 0 views

  •  
    At Radixweb, we are specialized in creative web design, graphic design, logo design, brochure design, banner design, illustration, identity creation at best price ever. Get affordable web design solutions from web Design Company based from India.
Anne Bubnic

Cell Phone Safety - 0 views

  • The fact that cell phones pose a great risk when combined with driving cannot be of any surprise to anyone. Let’s face it. First, drivers must take their eyes off the road while dialing. Second, people can become so absorbed in their conversations or other cell phone use that their ability to concentrate on the act of driving is severely impaired, jeopardizing the safety of vehicle occupants and pedestrians alike.
  • Time Away from Homework. Technology affords teens (and adults) a host of ways to do something other than what they are supposed to, in this case homework.
  • Mounting Minutes ($$$) Since consumers must be 18 in order to purchase a cell phone contract in the United States, most parents are buying the phones their children carry. This is good news because parents can choose a plan that fits how the cell phone will be used and can review monthly cell phone bills which typically includes a log itemizing phone activity. However, problems still exist. For one, children can quickly go over their allotted minutes for the month which can leave their parents with bills that can easily approach hundreds of dollars for the month.
  • ...1 more annotation...
  • Cell Phones and Gaming According to Sullivan (2004)3, when cellular phone games were simple, such as the knockoffs of the Atari-era "Breakout," there wasn't much to worry about. But newer phones with color displays and higher processing power create a landscape that might make some parents worried about what their kids are playing on the bus home from school.
  •  
    Today's cellular phones (cell phones) are more than just phones, they are hightech appliances that also serve as a mini-computers. Cell phones are electronic gadgets that allow users to surf the web, conduct text chats with others, take photos, record video, download and listen to music, play games, update blogs, send instant text messages to others, keep a calendar and to-do list, and more, much more. But cell phones also carry risks and cause distractions.
Anne Bubnic

Protecting Your Online Identity and Reputation - 0 views

  • Remember that nothing is temporary online. The virtual world is full of opportunities to interact and share with people around the world. It's also a place where nothing is temporary and there are no "take-backs." A lot of what you do and say online can be retrieved online even if you delete it — and it's a breeze for others to copy, save, and forward your information.
  • Mark your profiles as private. Anyone who accesses your profile on a social networking site can copy or screen-capture information and photos that you may not want the world to see. Don't rely on the site's default settings. Read each site's instructions or guidelines to make sure you're doing everything you can to keep your material private.
  • Safeguard your passwords and change them frequently. If someone logs on to a site and pretends to be you, they can trash your identity. Pick passwords that no one will guess (don't use your favorite band or your dog's birthday; try thinking of two utterly random nouns and mixing in a random number), and change them often. Never share them with anyone other than your parents or a trusted adult. Not even your best friend, boyfriend, or girlfriend should know your private passwords!
  • ...6 more annotations...
  • Don't post inappropriate or sexually provocative pictures or comments. Things that seem funny or cool to you right now might not seem so cool years from now — or when a teacher, admissions officer, or potential employer sees them. A good rule of thumb is: if you'd feel weird if your grandmother, coach, or best friend's parents saw it, it's probably not a good thing to post. Even if it's on a private page, it could be hacked or copied and forwarded.
  • Don't respond to inappropriate requests. Research shows that a high percentage of teens receive inappropriate messages and solicitations when they're online. These can be scary, strange, and even embarrassing. If you feel harassed by a stranger or a friend online, tell an adult you trust immediately. It is never a good idea to respond. Responding is only likely to make things worse, and might result in you saying something you wish you hadn't.
  • Take a breather to avoid "flaming." File this one under "nothing's temporary online": If you get the urge to fire off an angry IM or comment on a message board or blog, it's a good idea to wait a few minutes, calm down, and remember that the comments may stay up (with your screen name right there) long after you've regained your temper and maybe changed your mind.
  • Learn about copyrights. It's a good idea to learn about copyright laws and make sure you don't post, share, or distribute copyrighted images, songs, or files. Sure, you want to share them, but you don't want to accidentally do anything illegal that can come back to haunt you later.
  • Check yourself. Chances are, you've already checked your "digital footprint" — nearly half of all online users do. Try typing your screen name or email address into a search engine and see what comes up. That's one way to get a sense of what others see as your online identity.
  • Take it offline. In general, if you have questions about the trail you're leaving online, don't be afraid to ask a trusted adult. Sure, you might know more about the online world than a lot of adults do, but they have life experience that can help.
  •  
    Advice for teens from www.kidshealth.org. Here are some things to consider to safeguard your online identity and reputation:
    1. Remember that nothing is temporary online
    2. Mark your profile as private.
    3. Safeguard your passwords and change them regularly.
    4. Don't post inappropriate or sexually provocative pictures or comments.
    5. Don't respond to inappropriate requests
    6. Take a breather to avoid "flaming."
    7. Learn about copyrights.
    8. Check your digital footprint.
    9. Take it offline.
Vicki Davis

Search and Seizure of Cell Phones: Can You Hear Me Now? - 0 views

  • May school officials lawfully “search” the confiscated cell phone to look at stored text messages, photographs, videos, and logs of incoming and outgoing calls? Clearly, the circumstances of the search must satisfy the T.L.O. standard. Not as clear, however, is whether such a search violates federal or Michigan laws regarding stored electronic communications.
  • [A] search of a student by a teacher or other school officials will be ‘justified at its inception’ when there are reasonable grounds for suspecting that the search will turn up evidence that the student has violated or is violating either the law or the rules of the school. Such a search will be permissible in its scope when the measures adopted are reasonably related to the objectives of the search and not excessively intrusive in light of the age and sex of the student and the nature of the infraction.”
  • In Klump v Nazareth Area Sch Dist, 425 F Supp 2d 622 (ED Pa, 2006), a federal district court denied the school’s motion to dismiss a lawsuit filed by a student whose cell phone was searched.
  • ...5 more annotations...
  • compensatory and punitive damages for the alleged unconstitutional search, violation of the Pennsylvania Wiretapping and Electronic Surveillance Control Act, invasion of privacy, and defamation.
  • The court ruled that the student had stated a claim for the alleged violation of his right to be free from an unreasonable search.
  • here was no basis for them to search the text and voice mail messages stored on the phone.
  • unlawful access to the stored voice mail and text message communications.
  • (2) A person shall not willfully and maliciously read or copy any message from any telegraph, telephone line, wire, cable, computer network, computer program, or computer system, or telephone or other electronic medium of communication that the person accessed without authorization. (3) A person shall not willfully and maliciously make unauthorized use of any electronic medium of communication, including the internet or a computer, computer program, computer system, or computer network, or telephone.
  •  
    Legal Implications for Searching Student Cell Phones. Although this article is written against Michigan law, it does help clarify some of the concepts for what is permissable. Note that searching a student's cell phone or wireless device without parent permission may violate state wiretapping laws.
  •  
    Confiscating and looking at information on cell phones by school officials is still not clear. This is a very interesting case study for those working with digital citizenship issues at their school.
  •  
    Fascinating article explaining Michigan take on searching and confiscating cell phones.
Anne Bubnic

Facebook ID Theft Story 2 - 0 views

  •  
    Story of a FaceBook account that was hijacked. The criminal promptly changed all of he log-in information, impersonated the account owner, and sent requests to all of his friends for money. He claimed he was in London and his wallet had been stolen so he needed people to wire him money, ASAP.
buyverifiedets

Buy Wechat Account - 100% Fully Verified & Safe - 0 views

  •  
    Buy Wechat Account Introduction In China, Wechat is an extremely well-liked social media site. In that it enables user-to-user communication, it is comparable to WhatsApp, but it also offers a number of other features that set it apart. Users of Wechat, for instance, can follow each other's changes in a newsfeed and share photographs and videos. Additionally, Wechat includes an integrated payment system that makes it simple for users to make transactions online. What Is Wechat Account ? Users of the social media site Wechat can communicate with their friends and family. The ability to utilize all of Wechat's services requires a Wechat account, which can be used to log in. Making a WeChat account is free and simple. A working email address is all you need. You can start interacting with people once you've registered a Wechat account by adding them as friends, messaging them, and participating in group chats. Buy Wechat Account
  •  
    Introduction In China, Wechat is an extremely well-liked social media site. In that it enables user-to-user communication, it is comparable to WhatsApp, but it also offers a number of other features that set it apart. Users of Wechat, for instance, can follow each other's changes in a newsfeed and share photographs and videos. Additionally, Wechat includes an integrated payment system that makes it simple for users to make transactions online.
1 - 17 of 17
Showing 20 items per page