Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged personal

Rss Feed Group items tagged

Anne Bubnic

ReadWriteThink: Creating A Safe Online Profile - 0 views

  •  
    In this activity, teenagers explore online names by looking at sample e-mail addresses to determine what they can tell about the person who uses the account. After this exploration, teens choose a screen name or e-mail address for themselves as well as decide on personal details to include on a safe online profile.
Anne Bubnic

Privacy and the Internet: Traveling in Cyberspace Safely - 0 views

  •  
    When traveling in cyberspace, you provide information to others at almost every step of the way. Often this information is like a puzzle that needs to be connected before your picture is revealed. Information you provide to one person or company may not make sense unless it is combined with information you provide to another person or company. A summary of the more common ways you give information to others when using the Internet is provided.
Anne Bubnic

Digital Footprints: Your New First Impression [Video] - 7 views

  •  
    Excellent educator-created video offers students an introduction to the concepts of "managing personal identity online" and "digital footprint" and what it will mean in the course of their lifetime. Particularly noteworthy are the employer comments regarding what they learn from reading what job candidates have posted online and how it affects them both negatively and positively in considering the person for a job.
Anne Bubnic

Debt Ski | InDebtEd - 0 views

  •  
    Indebted is a campaign funded by the Peterson Foundation for college students that raises awareness about the dangers of excessive personal and government debt, and promotes action to help stop the fiscal crisis in the U.S. DEBT SKI was developed as a fun game for learning about personal finance. The object of the game is to accumulate as much savings and as little debt as possible. This could be used in a high school digital
Anne Bubnic

Should social networking sites be used to determine employment? - 0 views

  •  
    More employees are asking for and viewing social networking sites of job applicants. Most employees like to get a clear picture of the person they are hiring. Lets face it most companies want to make sure they know what they are getting before they spend the time and resources to hire and train a person. Recently officials in Bozeman, Montana requested for all job applicants to turn over their usernames and password of all of their social networking sites as part of the background check. Is that crossing the line?
Rof Harris

Control All Your Short Term Personal Crisis Issue.pdf - PdfSR.com - 0 views

  •  
    Immediate payday loans are ideal choice to satisfy to all your short term financial worries. So every borrower can get the ideal loan amount easily without any delay. Right fact you can be able to instantly clear your short term financial issue. You can be able to easily control all your short term personal crisis issue. You can get cash easily and click here and get more… http://www.loansinminutes.com.au/
Devia Rajput

In The World Top 10 Futile Person Remains Fraction - 0 views

  •  
    Now I'll Show you Top 10 Futile Person Remains Fraction.If you are big fan of development or you are completely touching this, there are several parts of the body which are not some longer essential to stay alive or exist.
buyverifiedets

Buy Verified Paxful Account - 100% Safe & Best Accounts. - 0 views

  •  
    Buy Verified Paxful Account Introduction A person-to-person marketplace called Paxful accepts more than 300 different payment methods. Direct trading in a wide range of currencies is possible between buyers and sellers. Both buyers and vendors on Paxful are free. An inexpensive fee is instead added to each transaction to encourage buyers and sellers to use the site. What is Paxful Account? For those wishing to purchase bitcoin using a number of payment methods, Paxful is a popular option. Paxful does come with some hazards, too. There is neither a buyer nor a seller protection on Paxful because it is a peer-to-peer marketplace. This implies that you are helpless if a trade fails. Because of this, it's crucial to only conduct business with reliable parties. Buy Verified Paxful Account
  •  
    Introduction A person-to-person marketplace called Paxful accepts more than 300 different payment methods. Direct trading in a wide range of currencies is possible between buyers and sellers. Both buyers and vendors on Paxful are free. An inexpensive fee is instead added to each transaction to encourage buyers and sellers to use the site. What is Paxful Account? For those wishing to purchase bitcoin using a number of payment methods, Paxful is a popular option. Paxful does come with some hazards, too. There is neither a buyer nor a seller protection on Paxful because it is a peer-to-peer marketplace. This implies that you are helpless if a trade fails. Because of this, it's crucial to only conduct business with reliable parties. Buy Verified Paxful Account
buyglobalshop

Buy Verified Coinbase Accounts - 100% active and safe - 0 views

  •  
    As cryptocurrency picks up more standard acknowledgment, stages like Coinbase have gotten to be well known choices for buying, offering, and putting away computerized monetary standards like Bitcoin and Ethereum. One imperative angle of utilizing Coinbase is the confirmation prepare that clients must go through in arrange to get to full account highlights. A confirmed Coinbase account gives extra security measures and get to to highlights like higher buying limits and the capacity to exchange reserves to outside wallets. Buy Verified Coinbase Accounts What is a confirmed Coinbase account? If you're modern to the world of cryptocurrency exchanging, you may have listened approximately the significance of having a confirmed Coinbase account. But what precisely does it cruel to have a confirmed account on Coinbase? In straightforward terms, a confirmed account on Coinbase is one that has experienced a careful confirmation handle to affirm the personality of the account holder. This confirmation prepare is in put to guarantee the security of the stage and to comply with different administrative requirements. Buy Verified Coinbase Accounts Having a confirmed Coinbase account not as it were gives included security to your account but too opens extra highlights and benefits. With a confirmed account, you can purchase, offer, and exchange a more extensive assortment of cryptocurrencies on the stage. Furthermore, having a confirmed account may moreover make it simpler to store and pull back reserves from your account, as a few installment strategies may as it were be accessible to confirmed clients. In this article, we will dig more profound into what it implies to have a confirmed Coinbase account and how you can go almost confirming your possess account. How do I confirm my Coinbase account? To guarantee the security of your account and comply with administrative prerequisites, Coinbase requires its clients to confirm their characters. Confirming your account is a basi
buyglobalshop

Buy Verified Webmoney Accounts - 100% Best Quality & full document verified - 0 views

  •  
    Have you ever listened of Webmoney accounts? If not, you're not alone. Webmoney is a well known online installment framework that permits clients to safely send and get cash from all over the world. It's a helpful way to pay for products and administrations online, as well as send cash to companions and family individuals. But what precisely are Webmoney accounts and how do they work? Buy Verified Webmoney Accounts What are the Webmoney Accounts? In today's advanced age, online exchanges have ended up an fundamental portion of our ordinary lives. One well known strategy for making secure online installments is through Webmoney accounts. But what precisely are Webmoney accounts, and how do they work? Buy Verified Webmoney Accounts Webmoney is a worldwide online installment framework that permits clients to safely send and get cash online. Comparative to administrations like PayPal, Webmoney accounts act as advanced wallets, permitting clients to store stores and make installments with fair a few clicks. With Webmoney, clients can effortlessly exchange cash to companions, family, or businesses around the world, making it a helpful and adaptable installment choice for those who do a parcel of their shopping and budgetary exchanges online. Is it secure to utilize a Webmoney account? When it comes to utilizing any online budgetary stage, security ought to continuously be a beat need. So, is it secure to utilize a Webmoney account? The brief reply is yes, but let's dive a bit more profound into what makes Webmoney a secure alternative for your online transactions. Buy Verified Webmoney Accounts Webmoney utilizes a assortment of security measures to guarantee the security of its users' accounts and data. One of the key highlights of Webmoney is the utilize of two-factor confirmation. This implies that in expansion to entering your watchword, you will moreover get a one-time code on your versatile gadget that you must enter to total certain exchanges. This inc
Dean Mantz

academyofdiscovery - Internet Safety - 8 views

  • I will never post any information more personal than my first name nor will I post pictures of myself. I will not plagiarize, instead I will expand on others' ideas and give credit where it is due. I will use language appropriate for school. I will not insult my fellow students or their writing. I will only post pieces that I am comfortable with everyone seeing; other pieces I will keep as drafts. I will not be afraid to express my ideas, while not overgeneralizing or making derogatory/inflammatory remarks; any posts or edits on controversial issues must either be submitted to Mr. Wilkoff prior to posting or be a part of a classroom project/question which addresses controversial issues. I will use constructive/productive/purposeful criticism, supporting any idea, comment, or critique I have with evidence. I will take all online content creation seriously, posting only things that are meaningful and taking my time when I write. I will try to spell everything correctly. I will not use my public writing (blog posts, comments, discussion topics, wiki edits) as a chat room, instead, I will save IM language for private conversations. I will not bully others in my blog posts or in my comments. I will never access another student's account in order to pose as them or look at their personal content, but I will advise them when they haven't logged out of their computer from my own account. I will be proactive in monitoring the comments that others leave on my blog, utilizing the comment blacklist if necessary. I will personalize my blog and keep my writing authentic, while taking responsibility for anything blogged in my name. I will not provoke other students in my blog posts or comments. I will use my online content as an extension of the classroom, and in doing so, I will leave anything that unsaid in the classroom unsaid online. I will only post photos which are school appropriate and either in the creative commons or correctly cited. I will not spam (including, but not limited to meaningless messages, mass messages, and repetitive messages) I will only post comments on posts that I have fully read, rather than just skimmed. I will respect the public nature of online information, and in doing so, I will respect the wishes of my fellow students for keeping their information (full name, compromising stories, etc.) private.
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • ...3 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Anne Bubnic

Humiliation and gossip are weapons of the cyberbully - 0 views

  • ead teachers are being advised to draw up new rules on mobile phone use amid a growing number of cases of what is now known as “cyber-bullying”. In many secondary schools, over 90% of bullying cases are through text messages or internet chatrooms. It is hoped that the rules about mobile phone use will protect children from abusive texts, stop phones going off in class and prevent mobiles being taken into exam halls.
  • Although the majority of kids who are harassed online aren’t physically bothered in person, the cyber-bully still takes a heavy emotional toll on his or her victims. Kids who are targeted online are more likely to get a detention or be suspended, skip school and experience emotional distress, the medical journal reports. Teenagers who receive rude or nasty comments via text messages are six times more likely to say they feel unsafe at school.
  • The problem is that bullying is still perceived by many educators and parents as a problem that involves physical contact. Most enforcement efforts focus on bullying in school classrooms, corridors and toilets. But given that 80% of adolescents use mobile phones or computers, “social interactions have increasingly moved from personal contact at school to virtual contact in the chatroom,'’ write Kirk R. Williams and Nancy G. Guerra, co-authors of one of the journal reports. “Internet bullying has emerged as a new and growing form of social cruelty.'’
  • ...1 more annotation...
  • Cyber-bullying tactics include humiliation, destructive messages, gossip, slander and other “virtual taunts” communicated through e-mail, instant messaging, chatrooms and blogs. The problem, of course, is what to do about it. While most schools do not allow pupils to use their mobiles in the school building, an outright ban is deemed unworkable. Advances in technology are throwing up new problems for teachers to deal with. Children use their phones to listen to music, tell the time or as a calculator. Cyber-bullies sometimes disclose victims' personal data on websites or forums, or may even attempt to assume the identity of their victim for the purpose of publishing material in their name that defames them or exposes them to ridicule.
  •  
    As more and more people have access to computers and mobile phones, a new risk to youngsters has begun to emerge. Electronic aggression, in the form of threatening text messages and the spread of online rumours on social networking sites, is a growing concern.
Vicki Davis

Think.com - Safety and Netiquette Lesson - 0 views

  • Identify and provide examples of proper and improper netiquette; Generate a list of preferred web behaviors for their class; Understand and use a few Think.com content creation tools; Define "safety" and describe/draw an environment that values safety; Develop a greater sense of personal responsibility and web community; and Define the following words: accountable, community, enforcement, environment, etiquette, inappropriate, law, netiquette, private, responsible, rule, safety.
  •  
    Think.com's safety lesson with nets standards. Think.com is excellent to use with younger students and is very walled and has an excellent profanity filter. I highly recommend it and have personally used it for a summer blogging project. Excellent site. It also requires an extensive verification process by the participating schools.
  •  
    Excellent lesson plan and activities from think.com for teaching digital citizenship, particularly safety and netiquette.
Anne Bubnic

Study: Teens See Disconnect Between Personal and School Writing - 0 views

  •  
    April 2008 : THE Journal. Students see a distinction between the writing they do for school and the writing they do in their personal lives. While the vast majority of 12- to 17-year-olds (85 percent) engage in some form of electronic writing--IM, e-mail, blog posts, text messages, etc.--most (60 percent) don't consider this actual writing.
Anne Bubnic

How To Stop Cyber-Bullying - 0 views

  • Yet with so many different types of cyberbullying, ranging from online impersonation to e-mail hacking and distributing embarrassing materials about a person, it can be difficult for kids, let alone those trying to help them, to know how to respond and stop the 21st century bully in his or her tracks. "Awareness about the issue is high, but awareness about what to do when it happens is mixed," says Michele Ybarra, president and research director for Internet Solutions for Kids (ISK) and an adjunct faculty member at Johns Hopkins School of Public Health.
  • Research suggests that those on the receiving end of traditional bullying may be more likely to cyberbully as a form of retaliation. Kids involved in the more severe instances of cyberbullying also tend to have more psychosocial problems, exhibiting aggression, getting in trouble at school and having poor relationships with their parents, says Nancy Willard, an expert on cyberbullying and author of Cyberbullying and Cyberthreats. And while traditional bullying appears to peak in middle school and drop off as kids reach high school, cyberbullying tends to slightly increase among kids in high school, a trend researchers can't yet explain.
  • One of the tricky things about helping cyberbullying targets is that they aren't always willing to talk about the problem. Teens often cite a fear of having their Internet privileges revoked as a reason for keeping quiet, Agatston says. Kids who receive threatening messages in school may not divulge what's happened for fear of getting in trouble, since many schools ban use of cellphones during the day. To get around that problem, Willard recommends having a frank discussion with your children about cyberbullying before it happens.
  • ...1 more annotation...
  • Research is also beginning to show that just like traditional forms of bullying, cyberbullying can lead to anxiety, lower rates of self-esteem and higher rates of school absence, says Patti Agatston, a licensed professional counselor with the Prevention/Intervention Center, a student assistance program serving more than 100 schools in suburban Atlanta, Ga.
  •  
    Kids can be mean.\n\nIt's a fact of life we've all experienced. Gone are the days, however, when avoiding a bully meant ducking out of the back door at school. Thanks to personal computers, cellphones and instant messaging, it's now easier than ever for children to attack each other, often anonymously.
Vicki Davis

Search and Seizure of Cell Phones: Can You Hear Me Now? - 0 views

  • May school officials lawfully “search” the confiscated cell phone to look at stored text messages, photographs, videos, and logs of incoming and outgoing calls? Clearly, the circumstances of the search must satisfy the T.L.O. standard. Not as clear, however, is whether such a search violates federal or Michigan laws regarding stored electronic communications.
  • [A] search of a student by a teacher or other school officials will be ‘justified at its inception’ when there are reasonable grounds for suspecting that the search will turn up evidence that the student has violated or is violating either the law or the rules of the school. Such a search will be permissible in its scope when the measures adopted are reasonably related to the objectives of the search and not excessively intrusive in light of the age and sex of the student and the nature of the infraction.”
  • In Klump v Nazareth Area Sch Dist, 425 F Supp 2d 622 (ED Pa, 2006), a federal district court denied the school’s motion to dismiss a lawsuit filed by a student whose cell phone was searched.
  • ...5 more annotations...
  • compensatory and punitive damages for the alleged unconstitutional search, violation of the Pennsylvania Wiretapping and Electronic Surveillance Control Act, invasion of privacy, and defamation.
  • The court ruled that the student had stated a claim for the alleged violation of his right to be free from an unreasonable search.
  • here was no basis for them to search the text and voice mail messages stored on the phone.
  • unlawful access to the stored voice mail and text message communications.
  • (2) A person shall not willfully and maliciously read or copy any message from any telegraph, telephone line, wire, cable, computer network, computer program, or computer system, or telephone or other electronic medium of communication that the person accessed without authorization. (3) A person shall not willfully and maliciously make unauthorized use of any electronic medium of communication, including the internet or a computer, computer program, computer system, or computer network, or telephone.
  •  
    Legal Implications for Searching Student Cell Phones. Although this article is written against Michigan law, it does help clarify some of the concepts for what is permissable. Note that searching a student's cell phone or wireless device without parent permission may violate state wiretapping laws.
  •  
    Confiscating and looking at information on cell phones by school officials is still not clear. This is a very interesting case study for those working with digital citizenship issues at their school.
  •  
    Fascinating article explaining Michigan take on searching and confiscating cell phones.
Anne Bubnic

Bullying Policy at Hudson Area School District - 0 views

  • Bullying or other aggressive behavior toward a student, whether by other students, staff, or third parties, including Board members, parents, guests, contractors, vendors, and volunteers, is strictly prohibited. This prohibition includes physical, verbal, and psychological abuse, including hazing, gestures, comments, threats, or actions to a student, which cause or threaten to cause bodily harm, reasonable fear for personal safety or personal degradation. Demonstration of appropriate behavior, treating others with civility and respect, and refusing to tolerate harassment or bullying is expected of administrators, faculty, staff, and volunteers to provide positive examples for student behavior. This policy applies to all activities in the District, including activities on school property, in a school vehicle, and those occurring off school property if the student or employee is at any school-sponsored, school-approved or school-related activity or function, such as field trips or athletic events where students are under the school’s control, or where an employee is engaged in school business. Misconduct occurring outside of school may also be disciplined if it interferes with the school environment. "Bullying" is any gesture or written, verbal, graphic, or physical act (including electronically transmitted acts – i.e. internet, telephone or cell phone, personal digital assistant (PDA), or wireless hand held device) that is reasonably perceived as being motivated either by any actual or perceived characteristic, such as race, color, religion, ancestry, national origin, gender, sexual orientation, gender identity and expression or a mental, physical, or sensory disability or impairment; or by any other distinguishing characteristic. Such behavior is considered harassment or bullying whether it takes place on or off school property, at any school-sponsored function, or in a school vehicle.
  •  
    Includes a clause for cyberbullying.
Anne Bubnic

Teachable Moment: Your Digital Foot Print - 5 views

  •  
    A blogger recounts the story of a woman's search for a housekeeper. After checking the work resumes of the most promising candidates, she googled each person's name. The results illustrate the need to manage your personal identity online and could be used as a good teaching example for kids.
Anne Bubnic

What is Privacy/Personal Information? [Video for 8-10 year olds] - 2 views

  •  
    Excellent 8-minute video from the UK's Thinkuknow education program that helps children to understand what constitutes personal information. The assembly enables children to understand that they need to be just as protective of their personal information online, as they are in the real world. It also directs where to go and what to do if children are worried about any of the issues covered.
‹ Previous 21 - 40 of 253 Next › Last »
Showing 20 items per page