Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items matching "Should" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Dimny Lopzzy

Month Installment Payday Loans Lead To Quick Financial Help! - 0 views

There is a chance that your greed for Month Installment Payday Loans can lead to quick financial help. If you want to accomplish the complete benefit from hassle free manner, then act with restrain...

online long term loans 12 month payday loans 12 month cash loans installment cash loans' long term payday loans cash 12 month installment

started by Dimny Lopzzy on 09 Jan 17 no follow-up yet
Rof Harris

Same Day Payday Loans In Minutes Used To Handle Emergency Wishes! - 0 views

Same Day Payday Loans In Minutes is used to handle emergency needs of short term funds when the sources of money have dried up for persons with a low credit record. These financial services should ...

loans in minutes instant loans immediate cash loans immediate loans immediate payday loans Short term payday loans

started by Rof Harris on 17 Jan 17 no follow-up yet
Rof Harris

Same Day Payday Loans In Minutes Used To Handle Emergency Wishes! - 0 views

Same Day Payday Loans In Minutes is used to handle emergency needs of short term funds when the sources of money have dried up for persons with a low credit record. These financial services should ...

loans in minutes instant loans immediate cash loans immediate loans immediate payday loans Short term payday loans

started by Rof Harris on 28 Dec 16 no follow-up yet
Rof Harris

Same Day Payday Loans In Minutes Used To Handle Emergency Wishes! - 0 views

Same Day Payday Loans In Minutes is used to handle emergency needs of short term funds when the sources of money have dried up for persons with a low credit record. These financial services should ...

loans in minutes instant loans immediate cash loans immediate loans immediate payday loans Short term payday loans

started by Rof Harris on 10 Aug 16 no follow-up yet
Rof Harris

Same Day Payday Loans In Minutes Used To Handle Emergency Wishes! - 0 views

Same Day Payday Loans In Minutes is used to handle emergency needs of short term funds when the sources of money have dried up for persons with a low credit record. These financial services should ...

loans in minutes instant loans immediate cash loans immediate loans immediate payday loans Short term payday loans

started by Rof Harris on 10 Aug 16 no follow-up yet
Rof Harris

Same Day Payday Loans In Minutes Used To Handle Emergency Wishes! - 0 views

Same Day Payday Loans In Minutes is used to handle emergency needs of short term funds when the sources of money have dried up for persons with a low credit record. These financial services should ...

loans in minutes instant loans immediate cash loans immediate loans immediate payday loans Short term payday loans

started by Rof Harris on 10 Aug 16 no follow-up yet
Anne Bubnic

What you should know about phishing identity-theft scams [Video] - 0 views

  •  
    Watch this excellent video from Microsoft to find out more about phishing e-mail scams and how they are used for identity theft. The video will show you how fraudulent e-mail messages and spoofed Web sites-two common forms of phishing-can trick you into s
Anne Bubnic

America's Libraries adapted to digital age - 0 views

  • As a group, libraries have embraced the digital age," said Lee Rainie, founding director of the Pew Internet & American Life Project, which has surveyed public attitudes toward libraries. "They've added collections, added software and hardware, upgraded the skills of their staff. A lot of institutions have had to change in the Internet age, but libraries still have a very robust and large constituency." A December 2007 Pew survey found that more than half of Americans — 53% — visited a library in the past year. That's expected to grow as more people look for free resources and entertainment in a slowing economy.
  • At the one-room Watha T. Daniel/Shaw Interim Library in the District of Columbia, books still line the shelves. But on one recent day, almost every adult at the library sat in front of a computer, surfing the Web, checking e-mail or visiting a social networking site.
  • The analysis found that libraries are thriving in the Internet age: •Attendance increased roughly 10% between 2002 and 2006 to about 1.3 billion. Regionally, Southern states lag the rest of the country in visits per capita. •Circulation, which measures how often library visitors check out print or electronic materials, increased about 9%, from 1.66 billion to 1.81 billion during the five-year period.
  • ...2 more annotations...
  • •The number of Internet-capable computers soared 39% — from about 137,000 in 2002 to nearly 190,000 in 2006. Libraries in rural states in New England and the Midwest led the country in public computers per capita in 2006. The increase in Internet access is thanks in part to the Bill & Melinda Gates Foundation, which launched a national program in 1997 to bring the Internet to libraries, beginning with the South. By 2003, the foundation had spent $250 million on some 47,000 computers, as well as training and tech support, bringing almost every public library online, said Jill Nishi, deputy director of the foundation's U.S. Libraries initiative. "You should be able to walk into any library and find Internet service," she said. "It's free, unfettered access to information."
  • Free Internet access is particularly important for low-income people, said Ken Flamm, an economics professor at the University of Texas at Austin who has studied the role of the Internet in public libraries. Only about a third of households with incomes below $25,000 have Internet access, according to federal data.
  •  
    The Internet was supposed to send America's public libraries the way of eight-track tapes and pay phones. But it turns out, they're busier than ever. Libraries have transformed themselves from staid, sleepy institutions into hip community centers offering
Anne Bubnic

Protecting Your Online Identity and Reputation - 0 views

  • Remember that nothing is temporary online. The virtual world is full of opportunities to interact and share with people around the world. It's also a place where nothing is temporary and there are no "take-backs." A lot of what you do and say online can be retrieved online even if you delete it — and it's a breeze for others to copy, save, and forward your information.
  • Mark your profiles as private. Anyone who accesses your profile on a social networking site can copy or screen-capture information and photos that you may not want the world to see. Don't rely on the site's default settings. Read each site's instructions or guidelines to make sure you're doing everything you can to keep your material private.
  • Safeguard your passwords and change them frequently. If someone logs on to a site and pretends to be you, they can trash your identity. Pick passwords that no one will guess (don't use your favorite band or your dog's birthday; try thinking of two utterly random nouns and mixing in a random number), and change them often. Never share them with anyone other than your parents or a trusted adult. Not even your best friend, boyfriend, or girlfriend should know your private passwords!
  • ...6 more annotations...
  • Don't post inappropriate or sexually provocative pictures or comments. Things that seem funny or cool to you right now might not seem so cool years from now — or when a teacher, admissions officer, or potential employer sees them. A good rule of thumb is: if you'd feel weird if your grandmother, coach, or best friend's parents saw it, it's probably not a good thing to post. Even if it's on a private page, it could be hacked or copied and forwarded.
  • Don't respond to inappropriate requests. Research shows that a high percentage of teens receive inappropriate messages and solicitations when they're online. These can be scary, strange, and even embarrassing. If you feel harassed by a stranger or a friend online, tell an adult you trust immediately. It is never a good idea to respond. Responding is only likely to make things worse, and might result in you saying something you wish you hadn't.
  • Take a breather to avoid "flaming." File this one under "nothing's temporary online": If you get the urge to fire off an angry IM or comment on a message board or blog, it's a good idea to wait a few minutes, calm down, and remember that the comments may stay up (with your screen name right there) long after you've regained your temper and maybe changed your mind.
  • Learn about copyrights. It's a good idea to learn about copyright laws and make sure you don't post, share, or distribute copyrighted images, songs, or files. Sure, you want to share them, but you don't want to accidentally do anything illegal that can come back to haunt you later.
  • Check yourself. Chances are, you've already checked your "digital footprint" — nearly half of all online users do. Try typing your screen name or email address into a search engine and see what comes up. That's one way to get a sense of what others see as your online identity.
  • Take it offline. In general, if you have questions about the trail you're leaving online, don't be afraid to ask a trusted adult. Sure, you might know more about the online world than a lot of adults do, but they have life experience that can help.
  •  
    Advice for teens from www.kidshealth.org. Here are some things to consider to safeguard your online identity and reputation:
    1. Remember that nothing is temporary online
    2. Mark your profile as private.
    3. Safeguard your passwords and change them regularly.
    4. Don't post inappropriate or sexually provocative pictures or comments.
    5. Don't respond to inappropriate requests
    6. Take a breather to avoid "flaming."
    7. Learn about copyrights.
    8. Check your digital footprint.
    9. Take it offline.
Anne Bubnic

You Have to Be a Parent Online Too - 0 views

  • "When we were kids, our parents always told us not to talk to strangers. That was drilled into our heads," he said. "But now, we have to factor in what happens on the Internet."
  • Security settings and parental involvement are especially important in the virtual world, Morris urged. "Check your child's e- mail account on a regular basis. You're the parent; you can do that."
  • While social networking sites like Facebook, Myspace and Xanga can be hot-spots for sexual predators, "not everything about these sites is bad," Morris said, noting some of the most up-to-date information after the NIU shootings was found on Facebook. "Good things do occur, but we need to make sure we're monitoring them," he said. Morris urged the group to keep home computers in plain sight, to outline their expectations and review communications regularly with their children. "We want to build that level of communication with their kids," he said. "If they're talking to someone they shouldn't, we want them to be able to come to us. A child should be able to listen to a parent more than a predator."
  •  
    Parents today have responsibilities in both the real world and the virtual world, Kane County Regional Office of Education Director Phil Morris told the Elgin Academy community Tuesday.
Anne Bubnic

Do Social Networks Bring the End of Privacy? [Scientific American] - 0 views

  • The closest U.S. privacy law comes to a legal doctrine akin to copyright is the appropriation tort, which prevents the use of someone else’s name or likeness for financial benefit. Unfortunately, the law has developed in a way that is often ineffective against the type of privacy threats now cropping up. Copyright primarily functions as a form of property right, protecting works of self-expression, such as a song or painting. To cope with increased threats to privacy, the scope of the appropriation tort should be expanded.
  •  
    Young people share the most intimate details of personal life on social-networking Web sites, such as MySpace and Facebook, portending a realignment of the public and the private. A post on YouTube can provoke global ridicule with the press of a return key. Social networks are forcing us to redefine what is truly private and what is public.
Anne Bubnic

Should schools teach Facebook? - 0 views

  •  
    FACEBOOK, MySpace, YouTube and Wikipedia are considered valuable educational tools by some who embrace the learning potential of the internet; they are also seen as a massive distraction with no academic benefit by others. Research in Nottingham and Notts suggests split opinions over the internet in the classroom. Some 1,500 interviews with teachers, parents and students nationwide showed the 'net was an integral part of children's personal lives, with 57% of 13 to 18-year-olds in Notts using blogs in their spare time and 58% in Nottingham. More than 60% of Nottingham teens use social networking sites. They are a big feature of leisure time - but now the science version of You Tube, developed by academics at The University of Nottingham, has been honoured in the US this week. The showcase of science videos shares the work of engineers and students online. However just a quarter of teachers use social networking tools in the classroom and their teaching, preferring to leave children to investigate outside school.
Anne Bubnic

The Road to Cybersafety - 0 views

  • Carrill is part of the Platte County Sheriff’s Office. He also leads the Western Missouri Cyber Crimes Task Force. One of his primary missions is to track down and arrest online predators who trade in child pornography.And all these cameras only make his job more challenging. About 40 percent of the nation’s minors have access to Webcams, Carrill explained, devices for uploading live video to the Internet. About 65 percent of all children have access to cell phone cameras.
  • erhaps the biggest issue is that fact that kids don’t understand that when a picture is posted online, it’s nearly impossible to remove.“Once that image is taken, it’s out there forever,” Shehan said. “The No. 1 issue that we’ve seen with Webcams is teenagers self-producing pornography.”
  • All we can tell them is, ‘I’m sorry,’” Carrill said. “The minute the camera clicks, you no longer own that image. It has the potential to harm that person years from now.”A Webcam placed in a child’s bedroom is another bad combination, according to Shehan and Carrill. Sexual predators search for kids who use Webcams in the privacy of their own rooms, then lure or blackmail the child into providing pictures of themselves.“We see cases time after time of children who take pictures, send them to a predator and get a pornographic collage back that the predator uses to blackmail the child into providing more images,” Shehan said.
  • ...3 more annotations...
  • . About 40 percent of the nation’s minors have access to Webcams, Carrill explained, devices for uploading live video to the Internet. About 65 percent of all children have access to cell phone cameras.Carrill’s team recently started a new operation to search image-trading Web sites for known child pornography in Missouri. The results were frightening, he said. More than 6,000 images were found in the state; about 700 of those pictures were downloaded in the Kansas City area.Between sexual predators who fish for images and immature decisions by kids with cameras, more children are either having their images posted online or being exposed to pornography, according to a 2006 report by the National Center for Missing and Exploited Children.
  • In the end, the best tool to defeat child pornography is parent education, according to both Shehan and Carrill. More than anything, kids need to know they can trust their parents.“It’s through that open line of communication between the parent and child that they can work through or prevent bad situations,” Carrill said.
  • All parents should follow a few basic rules when it comes to cyber safety, according to experts:- Keep computers in common areas of the home.- Monitor Internet use by children.- Enable privacy protection software.- Turn Webcams off or protect them with a password.- Track what images are being uploaded by children in the household.- Talk to children about what is appropriate.
  •  
    Webcams, cell phone cameras being put to troubling use, experts say. People are taking pictures, lots of them, and then uploading them as permanent displays in the Internet collection.
Anne Bubnic

101 Facts about Bullying: What Everyone Should Know - 0 views

  •  
    In 101 Facts about Bullying, Dr. Robin D'Antona and Dr. Meline Kevorkian have crafted a down-to-earth and useful guide to a number of basic facts about bullying, its causes, and its consequences. Kevorkian systematically discusses topics ranging from relational bullying to cyber bullying to media and video violence to the legal ramifications of bullying, debunking myth and uncloaking the facts about bullying and its prevention.
Anne Bubnic

Why Should Parents & Educators Be Concerned About Cyberbullying? [PDF] - 0 views

  •  
    Effects of Cyberbullying: New research by a group of school psychologists trained in Olweus Bullying Prevention methods that they have applied to bullying in the digital environment.
Anne Bubnic

Eight Ways to Handle Cyberbullies - 0 views

  • 1. Identify and blockFirst, ask your child not to respond or retaliate, no matter how tempting it may be to fight back. If you can identify who's cyberbullying your child, block any further communications.
  • 2. Set boundariesYou, not your kids, should also contact the bully (or bullies) and demand the offending behavior stop
  • 3. File a complaint Most cyberbullying behavior -- harassment, threats, invasion of privacy, stalking -- are violations of a web site or Internet service provider's "terms of service."
  • ...5 more annotations...
  • 4. Contact the schoolIf you know the bully attends the same school as your child, teachers and administrators might be able to help.
  • 5. Send a certified letterIf you've done all you can and the bullying hasn't stopped, send the child's parents a certified "cease and desist" letter.
  • 6. Call an attorneyIn the worst case scenario, a lawyer can help you consider filing a civil suit against bullies and/or their parents for defamation, harassment or other causes.
  • 7. Contact the local policeIf there's any evidence that the cyberbully's tactics include criminal actions, such as hate crimes, physical threats or talk of brandishing weapons at school, contact your local police immediately.
  • . Talk with your kids about what's acceptableAnne Collier, editor of NetFamilyNews web site, an email newsletter about online safety for kids, says to truly stop cyberbullying, however, you have to first know what's happening when your kids are online.
  •  
    Nancy Willard and Anne Collier offer eight ways to deal with cyberbullies in this article.
    1. Identify and block.
    2. Set boundaries.
    3. File a complaint.
    4. Contact the school
    5. Send the parents a certfied "cease and desist" letter.
    6. Call an attorney.
    7. Contact the local police.
    8. Talk with your kids about what's acceptable.

Anne Bubnic

Protecting Children from Adult Content on Wireless Devices - 0 views

  • What You Can Do If you are concerned about your children accessing adult material from their wireless phones/devices, consider the following: Monitor how your children are using their wireless phones or other wireless devices. For example, are they using them mainly for talking, or are they using them for messaging, taking photos and downloading applications? Check with your carrier to see what types of material it offers and what types can be accessed from your children’s handsets. Check with your carrier to see if there are ways to prevent access to and downloading of content that may contain inappropriate material and that is available on a per-use or per-application basis (e.g., games, wall paper images, songs). Monitor your bill. Any content purchases made from a wireless phone should appear on your monthly bill, so check your bill to see if any purchases have been made from your children’s phones/devices. The FCC requires that the descriptions of charges on wireless carrier bills be full, clear, non-deceptive, and in plain language. Check with your carrier to see what handsets are available for your children that are not capable of accessing advanced applications that may contain adult material. Check with your carrier to see whether subscriptions to wireless data or wireless Internet packages also offer access to adult material on your children’s phone.
  •  
    With the benefits of wireless technology comes a potential harm: the growing use of wireless phones and devices by children affords them the opportunity to access adult material that may be inappropriate for them. The FCC offers 6 tips for wireless safety.
Anne Bubnic

NECC highlights tech's 'transformative' power - 0 views

  • Become powerful advocates for change. Regardless of who inhabits the White House next year, educational technology must play a more prominent role in our national education policy, Davis said--and educators should do everything they can to ensure that it does.
  • Share your knowledge and your passion. Help others take steps to ensure their growth as teachers, Davis said--so they can help students grow as learners. 3. Showcase your work, and students' work, in innovative ways. Invite parents and community leaders into your schools, Davis said--or take students' projects to them with the help of podcasts and other technologies.
  • Dream big. Have high expectations for your students, Davis said, because the possibilities that educational technology offers are "endless." 5. Use all of the resources available to you as you try to effect change. These include ISTE's many online resources, such as the group's National Educational Technology Standards and its research-based reports.
  •  
    2008 National Educational Computing Conference also touts collaboration as a key to 21st-century learning
Anne Bubnic

Cyberbullying should be criminal offense: teachers - 0 views

  •  
    Delegates at a meeting of a national teachers' organization have unanimously voted in favour of urging the federal government to make cyberbullying a criminal offense. Members of the Canadian Teachers' Federation endorsed the policy of taking a tougher stand against cyberbullies at the group's annual meeting Saturday in Moncton.
« First ‹ Previous 121 - 140 of 188 Next › Last »
Showing 20 items per page