Skip to main content

Home/ Digiteen/ Group items tagged Issues

Rss Feed Group items tagged

Savana R

Lack of Privacy on the Internet - 0 views

  •  
    Facebook has upgraded more now days and you don't have as much privacy. Peoples life could be in danger if they have someone watching them and they don't know it. "Facebook's privacy system seems like it doesn't exist any more. According to the data below, around 2010, almost all your information is available to all. Back then, the situation was worse, what about today? Ever since the Facebook timeline was released, people complained greatly about the privacy issue. If the person could create an updated version of this infograph, I wonder where he would put the 2011 data ? "
Micah K

Taboo Topics: What to Do When You Don't Know What To Say | GenPink - 0 views

  •  
    This article discusses the proper way to possibly respond when faced with a religion difference. "The best way to respond to the topic of religion is to be respectful and voice a tolerance of others while remaining unwilling to discuss the issue in further detail."
Maggie H

Cyberbullying - 0 views

  • Cyberbullying is a growing concern around the world. It is clear that cyberbullying has a world-wide impact, but existing laws and increased education about the issue can help countries respond to and eliminate the problem. The Internet industry works to prevent and stop cyberbullying. One common solution to help stop cyberbullying on social networking sites is the ability to report abuse.
  • Cyberbullying is a global problem but government responses vary by country. This issue cannot be solved by the criminal punishment of teens; instead, the best solution is to encourage kids to make the right choices online in the first place.
  •  
    Cyberbullying is a growing world-wide problem. Different countries respond to cyberbullying differently.
Jenna A

My Library tagged digital_literacy - 0 views

  •  
    "Literacy and Reading News: Tackling Reading Fluency Issues "A National Reading Panel report that identified fluency as "a critical component of skilled reading," has inspired teachers across the country to make reading fluency a critical part of teaching and assessing students. Many teachers have turned to Jan Hasbrouck, Ph.D., a nationally known educational consultant, researcher, and trainer, for the best advice on how to improve their students' fluency. Dr. Hasbrouck defined fluency as the ability to read with appropriate speed, accuracy, and good expression. "Fluency is now understood to be a unique and fundamental component of skilled, proficient reading because of its close link to comprehension and motivation," she said. "Elementary students who struggle with fluency will most likely have difficulty understanding what they have read. These students will also be much less likely to read for pleasure and enjoyment."""
  •  
    Fluency is a very critical component.
Jenna A

Literacy and Reading News: Tackling Reading Fluency Issues - 0 views

  •  
    "A National Reading Panel report that identified fluency as "a critical component of skilled reading," has inspired teachers across the country to make reading fluency a critical part of teaching and assessing students. Many teachers have turned to Jan Hasbrouck, Ph.D., a nationally known educational consultant, researcher, and trainer, for the best advice on how to improve their students' fluency. Dr. Hasbrouck defined fluency as the ability to read with appropriate speed, accuracy, and good expression. "Fluency is now understood to be a unique and fundamental component of skilled, proficient reading because of its close link to comprehension and motivation," she said. "Elementary students who struggle with fluency will most likely have difficulty understanding what they have read. These students will also be much less likely to read for pleasure and enjoyment.""
  •  
    If students dont have literacy, it will not be as fun for them to read, because they cant do as well and it is a bore.
Jenna A

What is the importance of literacy? - - 0 views

  •  
    "Literacy is fundamental for learning in school. It has an impact on an individual's ability to participate in society and to understand important public issues. And it provides the foundation upon which skills needed in the labour market are built. Technology, and the science behind it, permeates all aspects of our lives, from how we work and communicate to what we shop for and how we pay our bills. The complexity of today's world means that individuals need to have some level of proficiency in reading, mathematics and science in order to understand and participate fully in economic and social life. "
  •  
    This tells you that literacy is very important if you want to go anywhere in life.
Kellie C

Cross-Cultural Differences in Perceived Risk of Online Shopping | JIAD - 0 views

  • There is little doubt that, in a considerably short period of time, the Internet has grown enormously in both its applications and number of users.
  •  
    This site pinpoints one topic that has issues with cultural differences.
October H

FTC Urges Congress to Pass Digital-Privacy Law - WSJ.com - 0 views

  •  
    "Frustrated by a flood of privacy violations, the Federal Trade Commission on monday issued a strong call for commercial-data collectors to adopt better privacy practices and called for Congress to pass comprehensive privacy legislation."
  •  
    This is a blog about the FTC wanting the Congress passing a new privacy law.
Vicki Davis

Do I Know You? Fake Friends Adding Fresh Danger To Facebook - 0 views

  •  
    The issue of fake friends and sham accounts is becoming a problem on FAcebook. This is an extensive article about the topic that can be referenced in our project. "Though the access varies depending on each individual's privacy settings, once a spammer has become "friends" with other users, he can then tag them in photos, post messages to their walls, chat with them, send status updates to their news feeds and connect with their friends. In this fashion, the fake friends insinuate themselves into the social networks of all of the people they reach, with each new friend reinforcing the appearance that the relationships are real and making it easier to add even more friends."
Vicki Davis

The NSA Is Building the Country's Biggest Spy Center (Watch What You Say) | Threat Leve... - 3 views

  •  
    I always tell my students when they travel with me never to joke in airports about anything. I have to admit that the new NSA center with the best decryption capabilities in the world and a seemingly blank check will have me add this article to our reading list as we talk about privacy. We thought the Internet was about freedom but have put so much of our private lives out there we may have just been giving it away. Don't freak out, just be aware. This particular issue is a black box so the article may be filled with conjecture. I thought it was worth the read,
Vicki Davis

ACLU Sues School For Punishing 12-Year-Old Over Facebook Comment - 2 views

  •  
    You'll want to read this lawsuit as it lies on the cusp of what we will experience in schools in the future. In this case, a 12 year old girl (on Facebook, despite the fact she is technically too young to be) is suing a school district (via the ACLU) for punishment because of her use of Facebook. I think the school went too far when it required her to hand over her Facebook and email login to the school, but we'll see what the courts decide. The ACLU says this is a violation of free speech. Stay tuned and realize that students have a right to hate you, say unkind things about you, etc. There is a fine line in what is allowed and what isn't. Just because we CAN deal with issues relating to bullying of other children - that doesn't mean we can wear our own chips on our shoulders and require that kids pretend to like us. It is hurtful when children say unkind things and many don't realize everyone is watching. If students are not understanding the consequences of their actions, then I partially blame any school that doesn't step up and teach digital citizenship.
Anne Baird

Education Week's Digital Directions: Open-Content Licensing - 0 views

  •  
    discussion of the issue of copyright and ownership and sharing of content
JustinM_mca MCA

Internet and Electronic Rights Issues - 0 views

  •  
    The website linked here shows some of the responsibilities and challenges of innovation. This provides what some innovators would expect when presenting ideas. It also includes what type of hostility and indifference you may receive when presenting your ideas to your superiors in the work place. Apparently some managers aren't very open to new ideas.
JordanB_mca MCA

Digital-Law.org - 0 views

  •  
    Digital law.org reflects on the goods and bads of technology. It has links on its page to take you to safety issues, lawsuits for using technology for bad reasons, and others. I think it would really be a helpful website to find out about digital law.
radhika chatterjee

You Tube or Your own "Professional Tube": Some Considerations: GoArticles.com - 0 views

  • According to ReadWriteWeb dot com's review in June 2008, YouTube's share of the movies download pie was a staggering 75%+ … bigger than Google's slice of the search market!
  • Using YouTube to reach the media is cheap and easy. This is the biggest advantage that can gain you high visibility, especially if you have to be cost conscious. It will show almost any movie content or format, though MPEG4 is the preferred form and AVI a close second.
  • YouTube has become a repository of an incredible variety of movies, infomercials, how to videos and much more. It lets you as a viewer, stay up to date with the newest videos and movies, through its subscription service.
  • ...2 more annotations...
  • There are lots of networking and viral marketing benefits, in reaching a wider audience; getting to know more people and learning through YouTube.
  • So there are issues associated with posting videos that feature bigotry, violence, sexually explicit materials and other abuses. Within YouTube there is a moderation process, but it can take some time before genuinely bad material is removed. There is frequent copyright infringement especially of cinema and music movies; and it remains to be seen when an effective response to this issue can be formulated.
Suzie Nestico

Digital Access - 0 views

  •  
    Current issues related to digital access and the law and current pending laws and the interaction of US laws and Globalization
Steve Madsen

Public Sphere | Kate Lundy - 0 views

  •  
    An Australian politician sets up mechanisms for the public to participate in discussions that have political importance.
  •  
    A "Public Sphere" is a space that "…through the vehicle of public opinion it puts the state in touch with the needs of society" [2]. This kind of engagement in public policy is a great way to represent different views and harness a broad range of expertise, particularly on topical issues of the day.
Brody C

Safety and Security on the Internet - 0 views

  • Why Should I Worry About Security? The Internet is a global collection of Interconnected Networks that facilitate information exchange and computer connectivity. The Internet is comprised of many different computers, all of which fall into two categories: servers (also known as "hosts") and clients (also known as "guests") -- technically, everything on the Internet can be considered a "host," but for this discussion, we'll use "hosts" and "guests." Guest machines send bursts of computer data called "packets" which are analyzed by the server belonging to the guest's Internet service provider. If the data is located locally (on the ISP's machine), the ISP's server will return the packets. If the information sought is not local (on another machine), the ISP's server hands off the packets to a router, which then sends the packets to the server containing the information. Once the information is located, it is sent back to the guest machine. There are many different types of computers that fill these two categories: mainframes, minicomputers, PCs, Macintosh, Unix and others. Despite the many varieties of computers that combine to form the Internet, every computer connected to the Internet needs to be able to communicate with every other computer -- without this ability, there is no Internet. All of these computers are able to communicate because in a sense they can all speak the same language -- TCP/IP. TCP/IP actually isn't a language; it is in computer terms what is known as a "protocol." A protocol is simply a standard for transmitting and receiving bits of information. As long as all of the interconnected computers follow the same protocol, they can exchange information. Unfortunately, when data is sent from one computer to another on the Internet, every other computer in between has an opportunity to see what's being sent. This poses an obvious security problem.
  • Say you decide to purchase concert tickets on the Web. To do so, you need to fill out an electronic form with your name, address and credit card number. When you submit the form, your information passes from computer to computer on its way to the concert ticket web server. It is possible that someone could be watching the data passing through one of the computers that is in between your computer and the concert ticket server. No one knows how often this happens, but everyone concedes it is technically possible. And its also possible off the web, too -- E-mail can be captured (and read, if not encrypted), as can file transfers via unsecure FTP. If someone wanted to, it wouldn't be too difficult to connect a capture device to someone's phone line (assuming they use a modem to connect to the Internet) and steal an electronic copy of the data exchanged on the Internet. Even if you make your purchase on a secure web site supporting the latest security features, it has been recently shown that secure sites can cause Internet Explorer (and other browsers) to send sensitive information to a non-secure server in plain text format.
  • The point is, there are a lot of security issues related to a network such as the Internet. No FAQ could possibly cover them all. That is why this FAQ concentrates on Internet Explorer. Because there are millions of people who use Microsoft Windows family products, and because those millions have the ability to blend Internet Explorer with these products, the seriousness about security should be of paramount importance to everyone. Remember,  software products are only as secure as the environment in which they operate.
  • ...2 more annotations...
  • What Security Features does Internet Explorer Have? Internet Explorer is a safe browser in many ways. The latest version of IE supports Secure Socket Layer (SSL) 2.0/3.0, Private Communication Technology (PCT) 1.0, CryptoAPI, and VeriSign certificates, and one version employs 128-bit encryption, one of the strongest forms of encryption that's commercially available for use over the Internet. To see if you have the 128-bit version of Internet Explorer, go to the Wells Fargo Bank site and take their browser test. "Secure Socket Layer (SSL) is a Netscape-developed protocol submitted to the W3C working group on security for consideration as a standard security approach for World Wide Web browsers and servers on the Internet. SSL provides a security "handshake" that is used to initiate the TCP/IP connection. This handshake results in the client and server agreeing on the level of security they will use and fulfills any authentication requirements for the connection. Thereafter, SSL's only role is to encrypt and decrypt the byte stream of the application protocol being used (for example, HTTP). This means that all the information in both the HTTP request and the HTTP response are fully encrypted, including the URL the client is requesting, any submitted form contents (such as credit card numbers), any HTTP access authorization information (usernames and passwords), and all the data returned from the server to the client." -- Microsoft's IIS 1.0 Features Tour. It has been reported, however, that SSL has been cracked. Private Communication Technology (PCT) is a Microsoft-developed security protocol available in IE only. According to their Internet draft, "The Private Communication Technology (PCT) protocol is designed to provide privacy between two communicating applications (a client and a server), and to authenticate the server and (optionally) the client. PCT assumes a reliable transport protocol (e.g., TCP) for data transmission and reception. The PCT protocol is application protocol-independent. A "higher level" application protocol (e.g., HTTP, FTP, TELNET, etc.) can layer on top of the PCT protocol transparently. The PCT protocol begins with a handshake phase that negotiates an encryption algorithm and (symmetric) session key as well as authenticating a server to the client (and, optionally, vice versa), based on certified asymmetric public keys. Once transmission of application protocol data begins, all data is encrypted using the session key negotiated during the handshake." IE also supports server and client authentication by using digital certificates to identify users to web servers. In addition, IE supports code signing with Authenticode, which verifies that downloaded code has not been modified. For more information on Authenticode, visit Microsoft's Authenticode page or the excellent Authenticode FAQ page. CryptoAPI 1.0 provides the underlying security services for the Microsoft Internet Security Framework. CryptoAPI allows developers to integrate cryptography into their applications. Microsoft has given a great deal of thought to the issue of security and it products, and Internet Explorer 4.0 is no exception. From "Security Zones" to continued support and refinement of Authenticode, IE4 promises to be one of the safest browsers of all time.  You can read all about the security available in IE 4 at http://www.microsoft.com/ie/ie40/?/ie/ie40/features/ie-security.htm. Also, check out what Microsoft is doing to keep transactions private with IE 4.
  • What are "Cookies?" Cookies are small text files that are sent to web browsers by web servers.  The main purpose of cookie files are to identify users and to present customized information based on personal preferences.  Cookie files typically contain information such as your name (or username), password information, or ad-tracking information.  There is a good body of literature on  the Internet about cookies.  Despite what you may have read or heard, most people, including myself, do not view cookies as any kind of a security threat.  However, because of the way cookies work (e.g., a web server storing a text file on someone's hard drive), Microsoft (and other browser manufacturers) have built options into their browsers that notify users when cookies are being passed to them, and give the user an option to prevent the cookie from being accepted.  I don't think this is a good idea.  By rejecting cookies, your browser may not display the entire page or the site may not function as intended. The reality is that cookies are text files -- they cannot contain viruses or execute applications, they cannot search your hard drive for information or send it to web servers, and most of the information they contain is simple tracking information designed to effect better customer service.
  •  
    safe things to do on the Internet and what to learn that is big
Vicki Davis

Net Neutrality FAQ: What's in it for You - PC World - 1 views

  •  
    Net neutrality is an important issue being addressed by the US government right now to prevent companies from sort of creating their own version of the Internet. These rules are supposed to keep things "open." I'm also sending these to my digiteen students (you can follow digiteen at http://www.twitter.com/digiteen) and Flat Classroom students (http://www.twitter.com/flatclassroom) for work on their project.
  •  
    Net neutrality deserves a mention in the Digiteen project and is an important topic being debated here in the US.
‹ Previous 21 - 40 of 79 Next › Last »
Showing 20 items per page