Skip to main content

Home/ Digiteen/ Group items tagged Control

Rss Feed Group items tagged

Joseph Edore

GetNetWise | Safety By Age 14-17 - 0 views

  • Safety By Age 14 to about 17: This can be one of the most exciting and challenging periods of a child's (and parent's) life. Your teen is beginning to mature physically, emotionally, and intellectually and is anxious to experience increasing independence from parents. To some extent that means loosening up on the reins, but by no means does it mean abandoning your parenting role. Teens are complicated in that they demand both independence and guidance at the same time. Teens are also more likely to engage in risky behavior both online and offline. While the likelihood of a teen being abducted by someone he meets in a chat room is extremely low, there is always the possibility that he will meet someone online who makes him feel good and makes him want to strike up an in-person relationship. It is extremely important that teens understand that people they meet online are not necessarily who they seem to be. Although it's sometimes difficult to indoctrinate teens with safety information, they can often understand the need to be on guard against those who might exploit them. Teens need to understand that to be in control of themselves means being vigilant, on the alert for people who might hurt them. The greatest danger is that a teen will get together offline with someone she meets online. If she does meet someone she wants to get together with, it's important that she not go alone and that she meet that person in a public place. It's important for parents to remember what it was like when they were teenagers. Set reasonable expectations and don't overreact if and when you find out that your teen has done something online that you don't approve of. That doesn't mean that you shouldn't take it seriously and exercise appropriate control and discipline, but pick your battles and try to look at the bigger picture. If your teen confides in you about something scary or inappropriate that he encountered online, your first response shouldn't be to take away his Internet privileges. Try to be supportive and work with your teen to help prevent this from happening in the future. And remember that your teen will soon be an adult and needs to know not just how to behave but how to exercise judgment, reaching her own conclusions on how to explore the Net and life in general in a safe and productive manner.
Mary Westbrook

Computer addiction - Wikipedia, the free encyclopedia - 0 views

  • 1 Lack of social interaction. Using the computer for pleasure, gratification, or relief from stress. Feeling irritable and out of control or depressed when not using it. Spending increasing amounts of time and money on hardware, software, magazines, and computer-related activities. Neglecting work, school, or family obligations. Lying about the amount of time spent on computer activities. Risking loss of career goals, educational objectives, and personal relationships. Failing at repeated efforts to control computer use.
Maggie B

Nine Elements - 3 views

  • one has the opportunity to communicate and collaborate with anyone from anywhere and anytime. Unfortunately, many users have not been taught how to make appropriate decisions when faced with so many different digital communicatio
  • communicate with other people. In the 19th century, forms of communication were limited. In the 21st
  • Digital Citizenship
  • ...23 more annotations...
  • citizenship can be defined a
  • to create rules and policy, we must teach everyone to become responsible digital ci
  • l uncomf
  • ic standards of conduct or procedure. Technology users often see this area as one o
  • oral goods and services are surfacing such as pornography and gambling. Users need to learn about how to be effective consumers in a new digital economy. 
  • t economy is being done electronically. Legitimate and legal exchanges are occurring, but the buyer or seller need
  • n electronic society. All people should have fair access to technology no matter who they are.  Places or organizations with limited connectivity need to be addressed as well.  To become productive citizens, we need to be committed
  • norms of appropriate, responsible behavior with regard to technology use. 
  • 1.   Digital Access:   full electronic participation in society. Technology users need to be aware of and support electronic access for all to create a foundation for Digital Citizenship.
  • s the
  • Digital
  • 2.   Digital Commerce:   electronic buying and selling of goods. Technology users need to understand that a large share of marke
  • 3.   Digital Communication:   electronic exchange of information.
  • One of the significant changes within the digital revolution is a person’s ability to
  • offer a wide variety of choices (e.g., e-mail, cellular phones, instant messaging).  The expanding digital communication options have changed everything because people are able to keep in constant communication with anyone else.
  • n options.
  • 4.   Digital Literacy:   process of teaching and learning about technology and the use of technology. While schools have made great progress in the area of technology infusion, much remains to be done. A renewed focus must be made on what technologies must be taught as well as how it should be used.
  • 5. Digital Etiquette:   electron
  • 9.   Digital Security (self-protection):   electronic precautions to guarantee safety.
  • We need to have virus protection, backups of data, and surge control of our equipment. As responsible citizens, we must protect our information from outside forces that might cause disruption or harm.
  • Digital Law:   electronic responsibility for actions and deeds
  • Digital Rights & Responsibilities:   those freedoms extended to everyone in a digital world
  • Digital Health & Wellness:   physical and psychological well-being in a digital technology world.
  •  
    Most people make the wrong health decisions. When they make these decisions, they mess up their whole life. Online health is the same. If you mess up there, you mess up your life.
  • ...2 more comments...
  •  
    "Nine Themes of Digital Citizenship Digital citizenship can be defined as the norms of appropriate, responsible behavior with regard to technology use. 1. Digital Etiquette: electronic standards of conduct or procedure. Technology users often see this area as one of the most pressing problems when dealing with Digital Citizenship. We recognize inappropriate behavior when we see it, but before people use technology they do not learn digital etiquette (i.e., appropriate conduct). Many people feel uncomfortable talking to others about their digital etiquette. Often rules and regulations are created or the technology is simply banned to stop inappropriate use. It is not enough to create rules and policy, we must teach everyone to become responsible digital citizens in this new society. 2. Digital Communication: electronic exchange of information. One of the significant changes within the digital revolution is a person's ability to communicate with other people. In the 19th century, forms of communication were limited. In the 21st century, communication options have exploded to offer a wide variety of choices (e.g., e-mail, cellular phones, instant messaging). The expanding digital communication options have changed everything because people are able to keep in constant communication with anyone else. Now everyone has the opportunity to communicate and collaborate with anyone from anywhere and anytime. Unfortunately, many users have not been taught how to make appropriate decisions when faced with so many different digital communication options. 3. Digital Literacy: process of teaching and learning about technology and the use of technology. While schools have made great progress in the area of technology infusion, much remains to be done. A renewed focus must be made on what technologies must be taught as well as how it should be used. New technologies are finding their way into the work place that are not being used in schools (e.g., videoconfer
  •  
    9 elements to digital citizenship
  •  
    In order for students to be achieve digital citizenship, we must know how to communicate properly.
  •  
    Nine Themes of Digital Citizenship Digital citizenship can be defined as the norms of appropriate, responsible behavior with regard to technology use. 1. Digital Access: full electronic participation in society. Technology users need to be aware of and support electronic access for all to create a foundation for Digital Citizenship.
Steve Madsen

How to keep control of the conversation - Perspectives - Opinion - Technology - 0 views

  •  
    BEING so well connected has its drawbacks. Things can unfold very quickly these days and suddenly avalanche into catastrophe.
Taylor B

The Core Rules of Netiquette -- Excerpted from Netiquette by Virginia Shea -- Albion.com - 2 views

  • Rule 1: Remember the Human Rule 2: Adhere to the same standards of behavior online that you follow in real life Rule 3: Know where you are in cyberspace Rule 4: Respect other people's time and bandwidth Rule 5: Make yourself look good online Rule 6: Share expert knowledge Rule 7: Help keep flame wars under control Rule 8: Respect other people's privacy Rule 9: Don't abuse your power Rule 10: Be forgiving of other people's mistakes
  •  
    " * Rule 1: Remember the Human * Rule 2: Adhere to the same standards of behavior online that you follow in real life * Rule 3: Know where you are in cyberspace * Rule 4: Respect other people's time and bandwidth * Rule 5: Make yourself look good online * Rule 6: Share expert knowledge * Rule 7: Help keep flame wars under control * Rule 8: Respect other people's privacy * Rule 9: Don't abuse your power * Rule 10: Be forgiving of other people's mistakes"
  •  
    Being on the Internet is fun, when you are respected as a person, and an individual. There are many people that dont feel safe on the internet, and these ruls will help make the internet a better place.
  •  
    These are some good topics to help us research.
Riya P

Parents should control use of technology - 3 views

  •  
    This article teaches parents what to do about online bullying.
Merritt D

How to be a better Cyber Citizen and stay safe online - Fort Lauderdale Parenting Teens... - 0 views

  •  
    How do your teens treat their friends - online? Teaching our kids and teens respect starts from a young age, however when it comes to technology, parents need to understand it is just as important to continue the lesson of respect digitally.
  •  
    How to be a cyber citizen and stay safe online are major topics in this day and age. Many people (not just teens) need to learn that respect should be carried into the digital world. Ten ways to be a better cyber citizen: 1.) Understand the technology available to protect you and your family's digital identity 2.)Consider using a personal security device when going online 3.)Use antivirus and antispyware software 4.)Teach family & friends about the importance of strong passwords 5.)Get involved in your child's online life 6.)Report cybercrime 7.) Protect your home or small business Wi-Fi network 8.) If you're a parent, consider parental control systems for Internet access on 3G mobile phones 9.) If your bank does not provide a smart bankcard, know the other safe ways to shop online 10.) Don't share information with web sites you don't trust
Brandon B

Internet Safety for young children. - 0 views

  •  
    Adults are not the only people that get on the internet. Young children do also and they need to know about all the stuff that goes on. This page will teach them about cyberbullying,peer pressure, and how to have self control.
Julie Lindsay

FTC Strengthens Kids' Privacy, Gives Parents Greater Control Over Their Information By ... - 0 views

  •  
    Changes coming for the COPPA law
Haley M

Copyright Law - Copyright and Fair Use - Library Guides at Polytechnic Institute of NYU - 0 views

  • Copyright Law DefinedCopyright law, as defined in Title 17 of the United States Code, protects "original works of authorship fixed in a tangible medium of expression" for a limited period. Copyright protection includes, for instance, the legal right to publish and sell literary, artistic, or musical work, and copyright protects authors, publishers and producers, and the public.  Copyright applies both to traditional media (books, records, etc.) and to digital media (electronic journals, web sites, etc.). Copyright protects the following eight categories of works: literary works musical works dramatic works pantomimes and choreographic works pictorial, graphic, and sculptural works motion pictures and other audiovisual works sound recordings architectural works Ownership of a copyrighted work includes the right to control the use of that work. Use of such work by others during the term of the copyright requires either permission from the author or reliance on the doctrine of fair use. Failure to do one or the other will expose the user to a claim of copyright infringement for which the law provides remedies including payment of money damages to the copyright owner.
Maggie H

iPredators: Cyberbullying to cyber-harassing troll cop from hell - 1 views

  • Newsletter Subscriptions Newsletter Archives White Papers Webcasts Podcasts This Week In Print IT Jobs Community Slideshows New Data Center Solution Centers Aruba Networks Bring Your Own Device (BYOD) Aerohive Enterprise Networking Solution Center BMC Control-M Workload Automation CA Technologies Executive Resource Center CA Technologies Transform Your IT Strategy Dell 12th Generation PowerEdge Servers Solution Center HP + Microsoft Data Management Appliances & Architectures Network World Accelerating the Cloud Challenge Network World Data Center Challenge 2012 Network World Next Generation Firewall Challenge Network World Wi-Fi Challenge Riverbed Accelerate Business Performance Solution Center Silver Peak's Virtual WAN Optimization Center View all Solution Centers // Network World #nww_header ul.top_nav li.dropdown ul { display:none; } #nww_header ul.top_nav li.dropdown_active ul { background:url("http://www.networkworld.com/includes/styles/r08/img/more-back.gif") repeat-x scroll left top black; cursor:pointer !important; border:1px solid black; position:absolute; margin-top:20px; display:block; width:150px; left:0; } #nww_header ul.top_nav li.dropdown span { background-position:right center; background-repeat:no-repeat; cursor:default !important; padding:0 0 0 6px; color:#000000; height:20px; width:37px; } #nww_header ul.top_nav li ul li { background:none repeat scroll 0 0 transparent; margin-left:0; padding:0; } #nww_header ul.top_nav li.dropdown_active ul li a { background:url("http://www.networkworld.com/includes/styles/r08/img/more-sep.gif") no-repeat scroll left bottom transparent; cursor:pointer !important; text-decoration:none; padding-bottom:5px; padding-left:10px; line-height:11px; padding-top:3px; color:#EEEEEE; display:block; width:130px; } #nww_header ul.top_nav li.dropdown_active ul li.noBackground a { background:none; } #nww_header ul.top_nav li.dropdown_active ul li a:hover { background:url("http://www.networkworld.com/includes/styles/r08/img/more-hi.gif") repeat-x scroll left bottom transparent; padding-right:10px; width:129px; } function isMoreHovering() { $("#morepopupcontainer").bind("mouseleave", function() { $("#morepopupcontainer").hide(); }); $("#morepopupcontainer").show(); } $(document).ready(function() { $('.dropdown').hover( function () { $(this).addClass("dropdown_active"); }, function () { $(this).removeClass("dropdown_active"); } ); }); News Blogs & Columns &lpos=Nav:Ut
  • Back to Microsoft SubnetPrivacy and Security FanaticMs. Smith -- Select Microsoft Subnet Blog --Author expert: Microsoft Expression Web 3Brian Egler's SQL Server StrategiesEssential SharePointManaging MicrosoftMicrosoft Explorer Microsoft InsightsMicrosoft, Google and cloud tech newsMostly MicrosoftPrivacy and Security FanaticRated Critical: A Microsoft Security BlogSecrets of Windows Back Office ServersSQL Marklar The Best Microsoft VideosThe Social EnterpriseWatch Your Assets Previous Article iPredators: Cyberbullying to cyber-harassing troll cop from hellOctober is pegged to raise awareness about cyberbullying, cybersecurity and domestic violence, but an iPredator can play a part in all three. While getting help from the authorities is not always easy, what about when the cyber-creep doing the harassing and trolling is a cop? By Ms. Smith on Wed, 10/24/12 - 12:24pm. window.fbAsyncInit = function() { FB.init({ appId : '147094931979429', //NWW appId channelUrl : '//www.networkworld.com/community/sites/all/modules/nwmisc/channel.html', status : true, // check login status cookie : true, // enable cookies to allow the server to access the session xfbml : true // parse XFBML }); FB.Event.subscribe('edge.create', function(response) { if(typeof(OPG.Tracking.omniture_tl) != 'undefined') OPG.Tracking.omniture_tl('Social Click Complete', 'default'); }); }; (function(d, s, id) { var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) return; js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/all.js#xfbml=1"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); 4 Comments Print document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); clas
  • When it comes to cyberbullying, there are thousands of articles online about the tragic suicide of 15-year-old Amanda Todd and how Anonymous may have unmasked the man who bullied her into sending pictures which he later posted online and sent to her friends. While the man responsible for tormenting the Canadian teenager was a creep and a bully, since an adult was involved then it technically wasn't cyberbullying, according to Stop cyberbullying.
  •  
    October is cybersecurity month and bullying prevention awareness month.
Haley M

Why must I indicate a claim for individual copyright materials in my program? | Screenr... - 0 views

  • Film and television programs contain a number of separate copyright materials including the visual images and associated sounds, the screenplay or narration, and other material incorporated in the film such as the music, sound recordings and artistic works. When a film or television program is copied, communicated or retransmitted under the royalty collection services, there are royalties for each of the separate copyright materials. By indicating a claim to a copyright material, you are warranting to Screenrights that you own or control the right to claim royalties for that specific copyright material incorporated in the program.
  •  
    This article explains why you must indicate a claim for individual copyright materials.
Kellie C

How to Prevent Culture Clashes | Africa Magazine Online | ReConnect Africa - 0 views

  • Why do cultures clash? Culture clashes occur when we judge the behaviour of a person from another culture using our own values. For example, a British approach to time may be that there is never enough and so we use it carefully and make sure we don't waste it. Another culture may see time as something they don't need to control so strictly and see a flexible response to things as more useful. These two different approaches can quickly lead to clashes in a business setting.
  •  
    This website tells about how to prevent internet culture clashes.
Blakelee H

How Do Computers Affect The Social Behavior Of Children? | LIVESTRONG.COM - 3 views

  • Effects of Moderate Use A moderate amount of computer use and game playing doesn't seem to affect social development. The social behavior of moderate computer users and nonusers was roughly the same in terms of sociability and relationships with friends and family. However, heavy computer users tended to believe they had less control over their lives than their classmates, a possible indication of inadequate socialization. Increased Hostility and Aggression After the massacre at Columbine High School in 1999, researchers and educators paid more attention to violent video games such as Doom, the daily game of choice for one of the two teenage killers. Many studies show that violent TV shows increase aggression and hostility in both children and adults. It appears the same is true of computer games. The key variable appears to be a preference for violent games, rather than the amount of time a child plays such games. Even playing Mortal Kombat for a short time increases a child's hostility and aggression. Violent computer games also desensitize children, who show less empathy and willingness to help others, according to research cited in "The Future of Children." Brain Drain In a small study of 18 Chinese university students, published in the "PLos ONE" journal and reported on Mail Online, kids who played games on their computers at least eight hours a day, six days per week showed alarming amounts of atrophy in parts of their brain, as measured by MRI scans. The scans also found abnormalities in the white matter of the brain, which coordinate communication between different areas of the mind. On Mail Online, Dr. Aric Sigman of the Royal Society of Medicine called the July 2011 report a "wake-up call." Experts fear that in addition to cognitive damage, heavy Internet use might reduce the inhibitions and decision-making ability of children, leading to damaged relationships with family members, peers and authority figures.
  •  
    Moderate use of internet and computers do not affect young people. Heavy use, however creates increased hostility and aggression, and can cause one to become "brain dead."
Blakelee H

Internet Addiction - 0 views

  • What are the warning signs of Internet addiction? Preoccupation with the Internet.  (Thoughts about previous on-line activity or anticipation of the next on-line session.) Use of the Internet in increasing amounts of time in order to achieve satisfaction. Repeated, unsuccessful efforts to control, cut back or stop Internet use. Feelings of restlessness, moodiness, depression, or irritability when attempting to cut down use of the Internet. On-line longer than originally intended. Jeopardized or risked loss of significant relationships, job, educational or career opportunities because of Internet use. Lies to family members, therapists, or others to conceal the extent of involvement with the Internet. Use of the Internet is a way to escape from problems or to relieve a dysphoric mood.  (e.g. Feelings of hopelessness, guilt, anxiety, depression.)
Maggie B

Internet Safety Tips for Elementary School Kids | Common Sense Media - 0 views

  •  
    Establishing Internet safety rules early sets your kids up for life. Get the basics. Staying Safe and Smart Online Advice & Answers Keep your kids safe online When your kids start to interact on the Internet -- playing games, watching YouTube videos, socializing in virtual worlds, getting homework help, and searching on Google -- you may feel that you're losing control over your kids' world.
Hayes G.

Protecting kids internet privacy - 0 views

    • Hayes G.
       
      Everyone should be educated about internet privacy.
  • Parents, teachers, and kids need to be educated about the risks of loss of privacy and how to control their personal information.
Micah K

Your Online Privacy: Because Your Privacy Matters!: Rule 8: Respect other people's priv... - 0 views

  •  
    "* Rule 1: Remember the Human * Rule 2: Adhere to the same standards of behavior online that you follow in real life * Rule 3: Know where you are in cyberspace * Rule 4: Respect other people's time and bandwidth * Rule 5: Make yourself look good online * Rule 6: Share expert knowledge * Rule 7: Help keep flame wars under control * Rule 8: Respect other people's privacy * Rule 9: Don't abuse your power * Rule 10: Be forgiving of other people's mistakes"
  •  
    This article gives rules for how to show respect for others online, and it elaborates on the 10 rules given. " Be forgiving of other people's mistakes"
Joseph Edore

Safety Tips for Tweens and Teens - OnGuard Online - 0 views

  • Quick Facts While social networking sites can increase your circle of friends, they also can increase your exposure to people with less-than-friendly intentions. Here are some things you can do to socialize safely online: Think about how different sites work before deciding to join a site. Some sites allow only a defined community of users to access posted content; others allow anyone and everyone to view postings. Keep some control over the information you post by restricting access to your page. Keep your full name, Social Security number, address, phone number, and bank or credit card account numbers to yourself. Make sure your screen name doesn't say too much about you. Even if you think it makes you anonymous, it doesn't take a genius to combine clues to figure out who you are and where you can be found. Post only information that you are comfortable with others seeing and knowing. Consider not posting your photo. It can be altered or broadcast in ways you may not be happy about. Flirting with strangers online could have serious consequences. Some people lie about who they really are. Be wary if a new friend wants to meet you in person. If you decide to meet them, meet in a public place, during the day, with friends you trust. And tell a responsible adult where you're going. Trust your gut if you have suspicions. If you feel threatened by someone or uncomfortable because of something online, tell an adult you trust, and then report it to the police.
Mary Westbrook

How to Prevent Computer Addiction | eHow.com - 0 views

  • Place reasonable limits on computer usage.
  • Adhere to your imposed computer usage limits.
  • Consider why you are using the computer if your usage becomes excessive. Boredom, anxiety, and depression
  • ...1 more annotation...
  • Seek assistance as soon as you realize that you are unable to properly control your computer usage.
‹ Previous 21 - 40 of 52 Next ›
Showing 20 items per page