Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items matching ""digital privacy"" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Anne Bubnic

ReadWriteThink: Naming in a Digital World: Creating a Safe Persona on the Internet - 3 views

  •  
    Naming in a Digital World: Creating a Safe Persona on the Internet. Students will:
    1.Explore naming conventions in digital and non-digital settings.
    2. Analyze the underlying connotations of names.
    3. Analyze the ways that name-giving practices vary from one culture to another.
    4. Synthesize their investigation by choosing and explaining specific names to represent themselves online.
Anne Bubnic

Do Social Networks Bring the End of Privacy? [Scientific American] - 0 views

  • The closest U.S. privacy law comes to a legal doctrine akin to copyright is the appropriation tort, which prevents the use of someone else’s name or likeness for financial benefit. Unfortunately, the law has developed in a way that is often ineffective against the type of privacy threats now cropping up. Copyright primarily functions as a form of property right, protecting works of self-expression, such as a song or painting. To cope with increased threats to privacy, the scope of the appropriation tort should be expanded.
  •  
    Young people share the most intimate details of personal life on social-networking Web sites, such as MySpace and Facebook, portending a realignment of the public and the private. A post on YouTube can provoke global ridicule with the press of a return key. Social networks are forcing us to redefine what is truly private and what is public.
Anne Bubnic

ReadWriteThink: Creating a Safe Persona on the Internet - 0 views

  •  
    Naming in a Digital World: Creating a Safe Persona on the Internet. Students will:
    1.Explore naming conventions in digital and non-digital settings.
    2. Analyze the underlying connotations of names.
    3. Analyze the ways that name-giving practices vary from one culture to another.
    4. Synthesize their investigation by choosing and explaining specific names to represent themselves online.
Jason Epstein

Digital Tattoo - 4 views

  •  
    Tutorial. Just like a tattoo, your digital reputation is an expression of yourself. It's highly visible, and hard to remove. Explore how your online identity affects you, your friends, your school and your job - for better and for worse - and how to make informed choices.
  •  
    This is AWESOME! Thank you!
  •  
    "In short, it is your digital identity. Just like a tattoo, your digital reputation is an expression of yourself. it is formed and added to by you and others over time."
Anne Bubnic

Howard Gardner on Digital Youth [Video] - 6 views

  •  
    Howard Gardner, the founder of multiple-intelligences theory discusses the challenges ethics and education face as digital media become more prevalent. Through his GOODPLAY PROJECT, he examines the ethical sense of young people. He ooks at five elements related to what it means to be ethical with new media: sense of identity, sense of privacy, sense of ownership/authorship, trustworthiness and credibility, and what it means to participate in a community.
Anne Bubnic

Setting Privacy Controls on Social networking sites - 0 views

  •  
    These flash video tutorials will show you how to adjust privacy settings on major social networking sites to restrict who can access and post on your child's website.
Julie Lindsay

My Privacy My Choice My Life - 0 views

  •  
    Excellent web site from the Canadian government addressing all issues of social networking, the internet and privacy for teens.
Anne Bubnic

Internet Safety for Kids: The Secret to Keeping Your Privacy - 0 views

  •  
    Helpful suggestions for how to teach your kids the proper way to respond to sites asking for personal information that would definitely keep their privacy at the same time while enabling them to still use the site.
Anne Bubnic

What Does COPPA Mean or Your Schools? - 0 views

  •  
    The Children's Online Privacy Protection Act (COPPA) is the key privacy regulation that protects children from having information about them collected by web site owners. In effect since April 2000, COPPA prohibits a web site owner or operator from "knowingly collecting information from children under the age of 13 unless the operator obtains parental consent and allows parents to review their children's information and restrict its further use."
Anne Bubnic

Digital Domain Archives Our Lives, Mistakes [Political Trail] - 0 views

  •  
    Social networks and digital media are making it easy for us to share our lives not just with our small circle of friends, but the entire world. With the invention of YouTube, Facebook and MySpace, we are creating a massive digital archive of our lives. The benefit of such a digital archive is that we no longer have to rely just on remembering memorable events: There are video and photos of it online. Besides just video and photos, there's also a massive text archive we are establishing with personal blogs. Every column I write for the Courier & Press is obviously archived for the history books, but so are the things that I write online.
Anne Bubnic

I'm So Totally, Digitally Close to You - 0 views

  •  
    Brave New World of Digital IntimacyIt is easy to become unsettled by privacy-eroding aspects of awareness tools. But there is another - quite different - result of all this incessant updating: a culture of people who know much more about themselves.
Jess McCulloch

Keeping students cybersafe! « On an e-journey with generation Y - 0 views

  •  
    As we are pioneers in cyberspace, cybersafety is a concern that is being refined and evaluated all the time - trying to balance transparency with privacy, allowing students some freedom, yet protecting them and ensuring their safety at all times. This article provides a review of what was done with a class of students over a year's time to teach them digital citizenship and cybersafety.
Anne Bubnic

A simple way to avoid being the next Star Wars Kid [Privacy online] - 0 views

  •  
    Embarrassing images can find their way onto the web all too easily, ruining the lives of the people depicted, but a 'privacy tag' could prevent it
Anne Bubnic

"Privacy" VoiceThread Albums Created by Teachers/Students - 1 views

  •  
    Examples of collaborative conversations by teachers and students around the digital citizenship topic of "privacy".
Anne Bubnic

iKeepSafe/ASCA: Privacy and Reputation Online - 1 views

  •  
    Resources to help students nationwide understand the importance of privacy, security and online reputation. Includes presentations, downloadable curriculum and resources in English and Spanish.
Anne Bubnic

Eight Tips for Monitoring and Protecting Your Online Reputation - 9 views

  •  
    Here are 8 tips to monitor and protect one's online reputation from the U.S. Government Information Security Blog: Search your name. Type your first and last name within quotation marks into several popular search engines to see where you are mentioned and in what context. Narrow your search and use keywords that apply only to you, such as your city, employer and industry association. Expand your search. Use similar techniques to search for your telephone numbers, home address, e-mail addresses, and personal website domain names. You should also search for your social security and credit card numbers to make sure they don't appear anywhere online. Read blogs. If any of your friends or coworkers have blogs or personal web pages on social networking sites, check them out to see if they are writing about or posting pictures of you. Sign up for alerts. Use the Google alert feature that automatically notifies you of any new mention of your name or other personal information. Limit your personal information. Tweet/chat/discuss regarding business and the emerging trends in your industry, but limit posting information on your personal life, which could be a subject of major scrutiny by recruiters and hiring managers. Also, be sure you know how organizations will use your information before you give it to them. Use privacy settings. Most social networking and photo-sharing sites allow you to determine who can access and respond to your content. If you're using a site that doesn't offer privacy settings, find another site. Choose your photos and language thoughtfully. You need to ensure that information posted online is written professionally without use of swear words and catchy phrases. Also, be very selective in posting photographs, and use your judgment to ensure that these photographs are how you want the world to see you. Take action If you find information about yourself online that is embarrassing or untrue, cont
Anne Bubnic

Your Child's Digital Footprint - 1 views

  •  
    Back in the day, people thought they could be anonymous online. Now everyone knows Internet activity leaves a trail. Some of those footprints are the unintended byproduct of other activities like shopping or registering to get access to a website. Other footprints are deliberate-a mark in the digital sand that says "I was here."
adina sullivan

CTAP4 Directory of Cybersafety Education Links - 0 views

  •  
    Convenient links to dozens of educational and nonprofit groups working on CyberSafety Issues and the education of teachers, students and parents.
  •  
    Links to over 80 education, government and nonprofit groups providing cybersafety and digital citizenship resources.
Anne Bubnic

An Educator's Guide To Responsible Technology Use [pdf] - 3 views

  •  
    26 page guide for Educators on Safety, Security and Ethics produced for K-12 students and teachers by the IIIA/James Madison University in cooperation with the Office of Ed Tech for the State of Virginia. Covers digital communication topics like ethics, digital footprint, flaming, spyware, viruses, hoaxes, spoofing & phishing, spam, identity theft, privacy, cyberpredators, social networking, gaming, and bullying via cell phone.
Anne Bubnic

Load Your Camera Phone Pix onto the Web - 0 views

  •  
    Ever wonder how your students do it? Steve Dotto shows you how you can take a picture with a camera phone and upload it to the web in only a few seconds. He discusses the privacy concerns around our pictures and sharing them.
‹ Previous 21 - 40 of 251 Next › Last »
Showing 20 items per page