Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Contents contributed and discussions participated by Anne Bubnic

Contents contributed and discussions participated by Anne Bubnic

Anne Bubnic

Schools' cyber security needs improvement - 0 views

  •  
    School districts are improving their physical security, but they might be neglecting the security of their computer infrastructure, if the results of an annual survey are any indication. The average physical safety rating of K-12 school districts improved by 39 percent over 2007, while the average cyber safety rating declined by 25 percent during the same time period, according to CDW-G's "2008 School Safety Index," which is designed to mark the current state of K-12 school safety.
Anne Bubnic

Felony Charge for MySpace Revenge Pics - 0 views

  •  
    Boy, 17, posted nude photos of 16-Year-Old girlfriend After she dumped him. When the girl discovered the photos had been posted on the Internet with explicit captions, she contacted police, who asked Phillips to take them down or face jail time.
Anne Bubnic

Piracy, Pornography, Plagiarism, Propaganda, Privacy - 0 views

  •  
    Merle Marsh wrote this highly informative article on Teaching Children to Be Responsible Users of Technology, which includes real-life incidents involving legal and ethical abuses of technologies. She also provides recommended educator activities and teaching suggestions.
Anne Bubnic

On the Identity Trail - 1 views

  •  
    Understanding the importance and impact of anonymity and authentication in a networked society. Be sure to check out the lesson plan for Grade 10-12 on Privacy issues at IN YOUR I.
Anne Bubnic

Passwords Are Like Underwear [Poster Program] - 0 views

  •  
    Developed by the IT Dept at University of Michigan, this series of five clever posters gets users to remember and adopt a few basic principles of password security. You can order copies off of their web site.
Anne Bubnic

Teen Harrassed By Older Men After MySpace Page Hacked - 0 views

  •  
    Latest story of an 8th grade student being harassed online after giving her password to some friends. After a falling out, they sabotaged her MySpace page, changed her password info and proceeded to post sexually provocative information.
Anne Bubnic

Identity Theft Portal - 0 views

  •  
    Learn everything you need to know about identity theft, credit card theft and fraud alerts and how to protect yourself. The portal provides both generic and state-by-state information. This resource would be good for a digital citizenship class and includes information on protecting both children and adults.
Anne Bubnic

A simple way to avoid being the next Star Wars Kid [Privacy online] - 0 views

  •  
    Embarrassing images can find their way onto the web all too easily, ruining the lives of the people depicted, but a 'privacy tag' could prevent it
Anne Bubnic

How to Turn Your Network into Fort Knox: 100 Tips + Tutorials - 0 views

  •  
    If you're a small business owner, family member, student or just someone with a laptop who loves shopping online and is addicted to your online banking, you might think that you're not a big target for identity thieves, hackers or viruses. The truth is that no one is really safe from prying eyes when they're online, so turn to this list of 100 tips, tutorials and resources that will help you beef up your own network security.
Anne Bubnic

My Privacy Contest: Deadline 12/12/08 - 0 views

  •  
    For Canadian students (from the Office of the Privacy Commissioner of Canada). Create your own public service announcement on the issue of privacy. You can record it, animate it - present it however you want. And as long as the focus is on some aspect of personal privacy you can make it about whatever you want.
Anne Bubnic

Mitigating the Internet's Negative Consequences - 0 views

  •  
    For the last 11 years Marje Monroe and Doug Fodeman have worked to educate schools, parents and students about the issues that affect children in an online world. Their Web site, ChildrenOnline.org, offers practical articles, resources, research, and a monthly newsletter on the topic. Recently, the team, which has a long background in education, self-published Safe Practices for Life Online, intended to show middle and high school students what scams target them and how to use the Internet more safely. A teacher's edition of the book will be available through the International Society for Technology in Education (ISTE) in November.

Anne Bubnic

In Your I ! [Privacy Online] - 0 views

  •  
    Video clip scenarios, lesson plans and handouts to teach students about privacy online. Privacy is all tied up in our sense of identity and how we interact with other people. We negotiate our privacy by revealing different things to different people in different circumstances. But when we talk online, what we say can be taken out of context. And that has consequences.
Anne Bubnic

10 ways parents can help stop cyberbullying - 0 views

  •  
    Every day, for kids of all ages, the problem of cyberbullying grows. The more time kids spend online, and the more net-savvy they become, the greater the odds are that they will become the target of other children who seek to hurt or embarrass them online.\n\nThe following are ten simple tips for keeping your kids safe online, and out of the hands of cyberbullies at school and from around the world.
Anne Bubnic

How online predators target children - 0 views

  •  
    One of the most dangerous, insidious aspects of the Internet is the targeting of children by online sexual predators. These criminals employ a series of clever, manipulative tactics to reach out to children in an effort to get them to meet in person. Any parent with children who use the Internet should be aware of the strategies employed by online predators.
Anne Bubnic

Back to School Tips| Americans for Technology Leadership - 0 views

  • Cyberbullying Cyberbullying or online bullying is repeated, unwanted or cruel behavior against someone through computers, cell phones, gaming consoles, or other Internet-based means. The Internet is always “on,” opening the door for 24-hour harassment. Cyberbullies can be anonymous. They never have to confront their victims, they don’t have to be physically stronger and cyberbullies may be virtually invisible to parents and adults.
  • Look for warning signs your child may be the victim of cyberbullying – depression, lack of interest in school and friends, drop in grades and subtle comments that something may be wrong. If your child is the victim of cyberbullying, take action. By filtering email, instant messages and text messages, you can cut off many of the ways the cyberbullies contact your child. By having your child avoid the sites and groups where the attacks occur, he/she can ignore the bully. If harassment continues, change your child’s email address, user names and Internet account. If these steps do not stop the cyberbullying, contact the parents of the child who is behind the bullying, contact the school, and if the situation is not resolved, involve the police. It’s important to compile copies of harassing emails and postings to have evidence for authorities or the school, so they can take action. Look for signs that your child may be the cyberbully themselves – if they sign onto the Internet under someone else’s name, if they use someone else’s password without their permission, if they posted rude or mean things about someone else online, if they use bad language online, or if they changed their profile or away message designed to embarrass or frighten someone. Talk to your kids about cyberbullying and why it’s wrong and hurtful.
  •  
    As children go back to school, many parents are concerned about how their children will be using the computer and Internet devices in the classroom. Communication is key. Parents need to talk with their children about how to use the Internet safely, potential threats and appropriate usage of the Internet. By understanding both the benefits and the risks of Internet use, families can have a safer and more secure online experience. This article includes key tips on cyberbullying, internet safety, privacy and security.
Anne Bubnic

Back To School, Back on the Internet, Back to Basics [PDF] - 0 views

  •  
    Back To School, Back on the Internet, Back to Basics: A Guide to Protect Yourself and Your Children Online .This double-sided brochure from Americans for Technology Leadership can be downloaded, printed and distributed to parents -- or used as a link from your school web site.
Anne Bubnic

Deter - Detect - Defend Against Identity Theft [Video] - 0 views

  •  
    9-minute video that would be good to show in a digital citizenship class. Identity theft is a serious crime. People whose identities have been stolen can spend months or years and thousands of dollars cleaning up the mess the thieves have made of a good name and credit record. In the meantime, victims of identity theft may lose job opportunities, be refused loans for education, housing, or cars, and even get arrested for crimes they didn't commit. Humiliation, anger, and frustration are among the feelings victims experience as they navigate the process of rescuing their identity.
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • ...3 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Anne Bubnic

Internet Safety for Kids: The Secret to Keeping Your Privacy - 0 views

  •  
    Helpful suggestions for how to teach your kids the proper way to respond to sites asking for personal information that would definitely keep their privacy at the same time while enabling them to still use the site.
Anne Bubnic

Load Your Camera Phone Pix onto the Web - 0 views

  •  
    Ever wonder how your students do it? Steve Dotto shows you how you can take a picture with a camera phone and upload it to the web in only a few seconds. He discusses the privacy concerns around our pictures and sharing them.
« First ‹ Previous 1401 - 1420 of 1747 Next › Last »
Showing 20 items per page