Group items matching
in title, tags, annotations or urlDo Social Networks Bring the End of Privacy? [Scientific American] - 0 views
-
The closest U.S. privacy law comes to a legal doctrine akin to copyright is the appropriation tort, which prevents the use of someone else’s name or likeness for financial benefit. Unfortunately, the law has developed in a way that is often ineffective against the type of privacy threats now cropping up. Copyright primarily functions as a form of property right, protecting works of self-expression, such as a song or painting. To cope with increased threats to privacy, the scope of the appropriation tort should be expanded.
-
Young people share the most intimate details of personal life on social-networking Web sites, such as MySpace and Facebook, portending a realignment of the public and the private. A post on YouTube can provoke global ridicule with the press of a return key. Social networks are forcing us to redefine what is truly private and what is public.
ReadWriteThink: Creating a Safe Persona on the Internet - 0 views
-
Naming in a Digital World: Creating a Safe Persona on the Internet. Students will:
1.Explore naming conventions in digital and non-digital settings.
2. Analyze the underlying connotations of names.
3. Analyze the ways that name-giving practices vary from one culture to another.
4. Synthesize their investigation by choosing and explaining specific names to represent themselves online.
Digital Tattoo - 4 views
-
Tutorial. Just like a tattoo, your digital reputation is an expression of yourself. It's highly visible, and hard to remove. Explore how your online identity affects you, your friends, your school and your job - for better and for worse - and how to make informed choices.
-
This is AWESOME! Thank you!
-
"In short, it is your digital identity. Just like a tattoo, your digital reputation is an expression of yourself. it is formed and added to by you and others over time."
Howard Gardner on Digital Youth [Video] - 6 views
-
Howard Gardner, the founder of multiple-intelligences theory discusses the challenges ethics and education face as digital media become more prevalent. Through his GOODPLAY PROJECT, he examines the ethical sense of young people. He ooks at five elements related to what it means to be ethical with new media: sense of identity, sense of privacy, sense of ownership/authorship, trustworthiness and credibility, and what it means to participate in a community.
Setting Privacy Controls on Social networking sites - 0 views
My Privacy My Choice My Life - 0 views
Internet Safety for Kids: The Secret to Keeping Your Privacy - 0 views
What Does COPPA Mean or Your Schools? - 0 views
-
The Children's Online Privacy Protection Act (COPPA) is the key privacy regulation that protects children from having information about them collected by web site owners. In effect since April 2000, COPPA prohibits a web site owner or operator from "knowingly collecting information from children under the age of 13 unless the operator obtains parental consent and allows parents to review their children's information and restrict its further use."
Digital Domain Archives Our Lives, Mistakes [Political Trail] - 0 views
-
Social networks and digital media are making it easy for us to share our lives not just with our small circle of friends, but the entire world. With the invention of YouTube, Facebook and MySpace, we are creating a massive digital archive of our lives. The benefit of such a digital archive is that we no longer have to rely just on remembering memorable events: There are video and photos of it online. Besides just video and photos, there's also a massive text archive we are establishing with personal blogs. Every column I write for the Courier & Press is obviously archived for the history books, but so are the things that I write online.
I'm So Totally, Digitally Close to You - 0 views
Keeping students cybersafe! « On an e-journey with generation Y - 0 views
-
As we are pioneers in cyberspace, cybersafety is a concern that is being refined and evaluated all the time - trying to balance transparency with privacy, allowing students some freedom, yet protecting them and ensuring their safety at all times. This article provides a review of what was done with a class of students over a year's time to teach them digital citizenship and cybersafety.
A simple way to avoid being the next Star Wars Kid [Privacy online] - 0 views
Eight Tips for Monitoring and Protecting Your Online Reputation - 9 views
-
Here are 8 tips to monitor and protect one's online reputation from the U.S. Government Information Security Blog: Search your name. Type your first and last name within quotation marks into several popular search engines to see where you are mentioned and in what context. Narrow your search and use keywords that apply only to you, such as your city, employer and industry association. Expand your search. Use similar techniques to search for your telephone numbers, home address, e-mail addresses, and personal website domain names. You should also search for your social security and credit card numbers to make sure they don't appear anywhere online. Read blogs. If any of your friends or coworkers have blogs or personal web pages on social networking sites, check them out to see if they are writing about or posting pictures of you. Sign up for alerts. Use the Google alert feature that automatically notifies you of any new mention of your name or other personal information. Limit your personal information. Tweet/chat/discuss regarding business and the emerging trends in your industry, but limit posting information on your personal life, which could be a subject of major scrutiny by recruiters and hiring managers. Also, be sure you know how organizations will use your information before you give it to them. Use privacy settings. Most social networking and photo-sharing sites allow you to determine who can access and respond to your content. If you're using a site that doesn't offer privacy settings, find another site. Choose your photos and language thoughtfully. You need to ensure that information posted online is written professionally without use of swear words and catchy phrases. Also, be very selective in posting photographs, and use your judgment to ensure that these photographs are how you want the world to see you. Take action If you find information about yourself online that is embarrassing or untrue, cont
Your Child's Digital Footprint - 1 views
-
Back in the day, people thought they could be anonymous online. Now everyone knows Internet activity leaves a trail. Some of those footprints are the unintended byproduct of other activities like shopping or registering to get access to a website. Other footprints are deliberate-a mark in the digital sand that says "I was here."
CTAP4 Directory of Cybersafety Education Links - 0 views
An Educator's Guide To Responsible Technology Use [pdf] - 3 views
-
26 page guide for Educators on Safety, Security and Ethics produced for K-12 students and teachers by the IIIA/James Madison University in cooperation with the Office of Ed Tech for the State of Virginia. Covers digital communication topics like ethics, digital footprint, flaming, spyware, viruses, hoaxes, spoofing & phishing, spam, identity theft, privacy, cyberpredators, social networking, gaming, and bullying via cell phone.
Load Your Camera Phone Pix onto the Web - 0 views
‹ Previous
21 - 40 of 251
Next ›
Last »
Showing 20▼ items per page
1.Explore naming conventions in digital and non-digital settings.
2. Analyze the underlying connotations of names.
3. Analyze the ways that name-giving practices vary from one culture to another.
4. Synthesize their investigation by choosing and explaining specific names to represent themselves online.