Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged research

Rss Feed Group items tagged

Anne Bubnic

My Pop Studio - 0 views

  •  
    My Pop Studio is a creative play experience that strengthens critical thinking skills about television, music, magazines and online media directed at girls. Users select from four behind-the-scenes opportunities to learn more about mass media: My Pop Studio strengthens media literacy skills, promotes positive youth development, and increases knowledge about health issues. Highly interactive creative play activities are used to create an online community that guides users through the process of deconstructing, analyzing and creating media. Video segments, flash animation, media deconstruction games and quizzes, and moderated blogs make the website lively, fun and educational. My Pop Studio was created by a team of researchers and media professionals at the Media Education Lab, located at Temple University's School of Communication.
adjustingto6figu

Running an Efficient Small Business with these 4 Incredible Steps! - Adjusting to 6 Fig... - 0 views

  •  
    Too often, entrepreneurs who start their own small businesses have almost no experience in managing a company. It's common practice for business owners, especially new ones, to conduct research and consult with experts on how to run a business. This endeavor will give you great insight so you are able to anticipate unwanted events that could send your company spiraling out of control, and to allow you to build a contingency plan to get things back on track. There will, however, always be time-robbers and inefficiencies in your staff or workforce that will incur drawbacks and get your business a few calls from disappointed clients or customers.
adrinawinslet

What is Conversion rate optimization and why it matters Ecommerce Business ? - 0 views

  •  
    Optimizing your Conversion Rate means the action that you want your visitor to take, you improve/optimize them. So visitors turn into buyers. It is a scientific and structured approach to improving the performance of your website. It does get complex as it seeks to understand/influence people. Tools for Conversation Rate Optimization: 1. Research and Analysis 2. User Survey 3. User Testing Your final takeaway is eCommerce Conversion rate optimization is new, strategic and here to stay. You are a smart entrepreneur so stay on top of the game. Also, remember that CRO is not a single exercise but a continual process of improvement. You are never "done" testing as there is always room for improvement.
adjustingto6figu

Beware The IRS Audit! I'm Being Audited - Now What? - 0 views

  •  
    Most Americans will not endure the stresses of an IRS audit. As an independent adjuster, however, you may be more vulnerable to the investigation. Research shows that individuals who earn more than $250,000 and/or file a Schedule C to report business expenses and losses are among those most likely to be targeted in an IRS audit. If you've received a notice from the IRS, you may start to panic - don't! The process is usually straightforward and, with the right information and assistance, you can make it through painlessly.
itgmbshop

Buy Facebook Ads Account/Verified Facebook Business Manager - 0 views

  •  
    Buy Facebook Ads Account In the digital age, Facebook Ads has advanced into an essential device for both corporations and those striving to increase their on-line presence, power targeted website traffic, and generate valuable leads. With its modern-day advertising and advertising platform, Facebook gives an array of focused on options, modern advert codecs, and analytical tools that permit users to extraordinary-music their advertising techniques and gather their dreams. The platform's versatility permits advertisers to achieve specific demographics, check diverse ad creatives, and take a look at ordinary standard overall performance metrics to optimize their campaigns. Despite these blessings, the approach of handling Facebook Ads campaigns may be complicated, disturbing meticulous making plans and execution to navigate successfully. This complexity often leads marketers to are searching out more streamlined solutions. For those trying to simplify their advertising and marketing and advertising and advertising efforts, buying a Facebook Ads account gives a compelling possibility. Acquiring an established account can provide a whole lot of blessings, consisting of at once get proper of entry to to a records of advert performance and a integrated music record of compliance with Facebook's tips. An cutting-edge account often comes with a treasured repository of statistics and insights that could boost up marketing advertising marketing campaign setup and execution. This may be in particular satisfactory for modern day advertisers or those seeking out to brief scale their efforts with out the need to gather an account's records from scratch. By leveraging an account with a installed basic overall performance history, businesses can avoid some of the common pitfalls related to beginning anew and probably gain from a head start in attaining their advertising dreams. However, the technique of buying a Facebook Ads accountis not with out its dangers and concerns
Anne Bubnic

FOSI 2011 Conference Highlights [Video] - 2 views

  •  
    Highlights from FOSI's (Family Online Safety Institute) 2011 Annual Conference in Washington, DC.
Rhondda Powling

Young People, Ethics, and the New Digital Media | The MIT Press - 4 views

  •  
    "The authors argue that five key issues are at stake in the new media: identity, privacy, ownership and authorship, credibility, and participation. Drawing on evidence from informant interviews, emerging scholarship on new media, and theoretical insights from psychology, sociology, political science, and cultural studies, the report explores the ways in which youth may be redefining these concepts as they engage with new digital media."
  •  
    "The authors argue that five key issues are at stake in the new media: identity, privacy, ownership and authorship, credibility, and participation. Drawing on evidence from informant interviews, emerging scholarship on new media, and theoretical insights from psychology, sociology, political science, and cultural studies, the report explores the ways in which youth may be redefining these concepts as they engage with new digital media."
Anne Bubnic

Web Literacy for the Digital Generation - 7 views

  •  
    Slideshow presentation by Chris O'Neal (ISTE) and Rob Bayuk (Microsoft). Microsoft and ISTE have joined forces to put together a series of web literacy lessons, activities, and support resources to help students develop their critical thinking skills when searching the web. You can find the teacher resources here: http://www.microsoft.com/education/teachers/guides/critical_thinking.aspx
anonymous

Harvard Study Finds Teens Online Lack Ethics - 10 views

  •  
    Harvard researchers studying the ethical sensibilities of youth have found that most young people are devoid of ethical thinking or consideration for others when using the web.
Anne Bubnic

Go Figure [FOSI Online Safety Video] - 4 views

  •  
    Facts and Figures about Online Safety from FOSI, the Family Online Safety Institute. (Presented at their annual conference, Nov 2010).
Anne Bubnic

The Kids are Alright [Study of Privacy Habits] - 4 views

  •  
    An October 2010 study of the privacy habits of parents and their teens on social networks, conducted by TRUSTe, one of the foremost authorities on online privacy. Data suggests that the majority of teens use privacy controls on social networks and that most parents actively monitor their teen's privacy. However, there is still room for improvement a some privacy areas were identified where teens are at risk on social networks. There are some good videos on this site including parents and teens talking about privacy issues.
Anne Bubnic

Remix Culture: Center for Social Media [Video] - 0 views

  •  
    From American University's School of Communication. When is it fair and legal to use other people's copyrighted work to make your own? What's the line between infringement and fair use? Take this tour of remix culture classics, and use the Code of Best Practices in Fair Use for Online Video to make your own decisions. This video is also available as a quicktime download.
Anne Bubnic

Digital Natives »The Ballad of Zack McCune (Part III) - 0 views

  •  
    In April of last year, Zack McCune was sued by the RIAA. He ended up $3,000 lighter (he settled), but with a much richer understanding of the contemporary debate surrounding music, copyright law, and file sharing. Part I gives an intro to his story, while Part II explores the disconnect between young downloaders and the recording industry. Part III, presented here, concludes Zack's misadventure and examines where it led him: to the Free Culture Movement, which advocates more flexible intellectual property law.
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • ...3 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Anne Bubnic

Protecting Your Online Identity and Reputation - 0 views

  • Remember that nothing is temporary online. The virtual world is full of opportunities to interact and share with people around the world. It's also a place where nothing is temporary and there are no "take-backs." A lot of what you do and say online can be retrieved online even if you delete it — and it's a breeze for others to copy, save, and forward your information.
  • Mark your profiles as private. Anyone who accesses your profile on a social networking site can copy or screen-capture information and photos that you may not want the world to see. Don't rely on the site's default settings. Read each site's instructions or guidelines to make sure you're doing everything you can to keep your material private.
  • Safeguard your passwords and change them frequently. If someone logs on to a site and pretends to be you, they can trash your identity. Pick passwords that no one will guess (don't use your favorite band or your dog's birthday; try thinking of two utterly random nouns and mixing in a random number), and change them often. Never share them with anyone other than your parents or a trusted adult. Not even your best friend, boyfriend, or girlfriend should know your private passwords!
  • ...6 more annotations...
  • Don't post inappropriate or sexually provocative pictures or comments. Things that seem funny or cool to you right now might not seem so cool years from now — or when a teacher, admissions officer, or potential employer sees them. A good rule of thumb is: if you'd feel weird if your grandmother, coach, or best friend's parents saw it, it's probably not a good thing to post. Even if it's on a private page, it could be hacked or copied and forwarded.
  • Don't respond to inappropriate requests. Research shows that a high percentage of teens receive inappropriate messages and solicitations when they're online. These can be scary, strange, and even embarrassing. If you feel harassed by a stranger or a friend online, tell an adult you trust immediately. It is never a good idea to respond. Responding is only likely to make things worse, and might result in you saying something you wish you hadn't.
  • Take a breather to avoid "flaming." File this one under "nothing's temporary online": If you get the urge to fire off an angry IM or comment on a message board or blog, it's a good idea to wait a few minutes, calm down, and remember that the comments may stay up (with your screen name right there) long after you've regained your temper and maybe changed your mind.
  • Learn about copyrights. It's a good idea to learn about copyright laws and make sure you don't post, share, or distribute copyrighted images, songs, or files. Sure, you want to share them, but you don't want to accidentally do anything illegal that can come back to haunt you later.
  • Check yourself. Chances are, you've already checked your "digital footprint" — nearly half of all online users do. Try typing your screen name or email address into a search engine and see what comes up. That's one way to get a sense of what others see as your online identity.
  • Take it offline. In general, if you have questions about the trail you're leaving online, don't be afraid to ask a trusted adult. Sure, you might know more about the online world than a lot of adults do, but they have life experience that can help.
  •  
    Advice for teens from www.kidshealth.org. Here are some things to consider to safeguard your online identity and reputation:
    1. Remember that nothing is temporary online
    2. Mark your profile as private.
    3. Safeguard your passwords and change them regularly.
    4. Don't post inappropriate or sexually provocative pictures or comments.
    5. Don't respond to inappropriate requests
    6. Take a breather to avoid "flaming."
    7. Learn about copyrights.
    8. Check your digital footprint.
    9. Take it offline.
Anne Bubnic

Digital Natives/Digital Dossiers [video] - 0 views

  •  
    Your digital dossier is made up of all the digital tracks you leave behind - from your photos on Flickr, to the Facebook messages you send, to all the data your credit card company collects about your transactions. On a daily basis, digital natives are consistently leaving information about themselves in secure or non-secure databases. You probably do this without a second thought in you day-to-day life - but have you ever considered the amount of information being collected about you, or the extent to which this information spreads?\nIn this video, created by Kanupriya Tewari, we explore this issue from the perspective of a child born today - Andy - and the timeline of all the digital files he accumulates in a life span.
Anne Bubnic

The Millennials Are Coming! - 0 views

  • Most agencies manage sensitive citizen data: addresses, Social Security numbers, financial records and medical information. You name it, some state or local office has it, and probably electronically. The problem? Many theorize that the Millennials' penchant for online openness could unintentionally expose private information, leaving it ripe for the picking. Millennials bring innovative ideas about technology's use, but for that same reason, do they also pose new security risks?
  • Anti-virus vendor Symantec released a study in March 2008 assessing this issue. Symantec commissioned Applied Research-West to execute the study, and 600 participants were surveyed from different verticals, including government. Survey participants included 200 IT decision-makers, 200 Millennial workers and 200 non-Millennial workers born before 1980. The data revealed that Millennials are more likely than workers of other ages to use Web 2.0 applications on company time and equipment. Some interesting figures include: 69 percent of surveyed Millennials will use whatever application, device or technology they want at work, regardless of office IT policies; and only 45 percent of Millennials stick to company-issued devices or software, compared to 70 percent of non-Millennials.
  • How might young people be workplace assets? Could all that time typing or texting make them speedy typists, able to whip up memos at the drop of a hat? Does familiarity with new and emerging technologies have its benefit? You bet, according to Dustin Lanier, director of the Texas Council on Competitive Government. The council brings state leaders together to shape policy for government departments, including IT. "I think they've built an approach to work that involves a lot of multitasking," Lanier said of the Millennials. "Something will be loading on one screen, you alt-tab to another application and pull up an e-mail, the first process loads, you flip back, start a new process, flip to a forum and pull up a topic. It's frenetic but normal to that group." Lanier doesn't think Millennials present more of an IT threat than their older co-workers. After all, young people don't have a monopoly on being distracted in the office. "I can't tell you how many times I've walked by people's desks of all ages and seen Minesweeper up," he said. He thinks employers should embrace some Web 2.0 applications. Otherwise, Millennials might be discouraged from sticking around. According to Lanier, this younger work force comprises many people who think of themselves as free agents. Government should accommodate some of their habits in order to prevent them from quitting.
  •  
    Get ready CIOs. They're coming. They have gadgets and doohickeys galore. They like their music downloadable and portable, and they grew up with the Internet, not before it. Their idea of community is socializing with people in other cities or countries through Facebook, MySpace or instant messages, and they use e-mail so often they probably think snail mail is an endangered species. They're the Millennials - those tech-savvy, 20-somethings and-under bound to warm up scores of office chairs left cold by retiring baby boomers. There's a good chance many will come to a government workplace near you, but their digital literacy could prove worrisome for security-conscious bosses.
Anne Bubnic

Digital Citizenship: Ethical Direction [pdf] - 0 views

  •  
    [Mike Ribble and Gerald Bailey]
    Leading and Learning with Technology, Vol. 32, Number 7
    Everyone has an internal compass but adults need to teach children how to find and use it. This article includes some scenarios that require students to use their internal compasses.

« First ‹ Previous 161 - 180 of 292 Next › Last »
Showing 20 items per page