Skip to main content

Home/ Digiteen/ Group items tagged Online

Rss Feed Group items tagged

3More

How much information is too much in cyberspace? - web - Technology - smh.com.au - 0 views

  • Twitter, Facebook and other similar online services are making it easier than ever for people to share their thoughts with others. But the obsession many people have for posting updates also raises the question: When does sharing about one's personal life cross the line and become too much information?
  •  
    Twitter, Facebook and other similar online services are making it easier than ever for people to share their thoughts with others. But the obsession many people have for posting updates also raises the question: When does sharing about one's personal life cross the line and become too much information?
  •  
    When does sharing about one's personal life cross the line and become too much information?
1More

Welcome to Stay Safe Online | STAYSAFEONLINE.org - 0 views

  •  
    safety and security online
18More

Internet Collaboration: Good, Bad, and Downright Ugly - 0 views

  • Tips for Effective Internet Collaboration
  • in order to make the most of an often bad situation, I offer eight tips for effective Internet collaboration. These tips were developed based on my experiences over the past
  • While
  • ...14 more annotations...
  • c communication re
  • I believe strongly that electroni
  • mains a poor substitute for face-to
  • -face communication, I also realize that some collaborative projects would n
  • t be practical without it. So,
  • ew years with groups that follow them and
  • th groups
  • with groups that don't.
  • 1. Appoint a single leader or a small group of leaders who are responsible for making sure everything runs smoothly. These leaders need not have any decision-making authority, but they should have administrative responsibilities such as: keeping debates on topic, setting and enforcing deadlines, maintaining the group mailing list, and keeping a group archive. They should also be willing to serve as a resource and answer questions from group members so that these questions need not clog the mailing list. These leaders must be diligent about carrying out their responsibilities and should seek assistance should they find themselves over burdened. 2. Establish a no flame policy for your group. Flame wars are destructive to just about any collaborative effort. Group leaders should make a point of not involving themselves in flame wars, even if they are the target of a flame. They should also gently remind other group members of the policy. Some groups may wish to give a leader the authority to remove group members who repeatedly engage in flame wars. 3. Establish a policy of open communication between all group members. Members should keep everyone informed of the progress they have made i
  • n carrying out their responsibilities. If someone is havin
  • Establish
  • trouble completing a task they volunteered to do (due to lack of time, lack of expertise, or any other reason), they should inform other group members. If some group members communicate privately about a group matter, they should inform the rest of the group about the outcome of their discussion (being careful to say ``we recommend'' rather than ``we decided'' unless the group has given them the authority to make the decision). It is especially important for anyone in a leadership position to communicate with other members and make sure that the members are communicating with each other. 4. Establish a mission statement and set of operating procedures for your group. Depending on the size of your group and the duration of your project, this may be a short list of ground rules or a formal constitution. You should have guidelines and rules that cover the responsibilities of the leaders, the responsibilities of members, procedures for making decisions (including what to do in the event of a deadlock), procedures for appointing and expelling group members or leaders, and procedures for changing these rules. When working on a long-term, open ended project it is best to keep the ground rules somewhat flexible so that unanticipated ideas are not precluded and new group members don't feel stifled by a framework established by members long-retired. 5. Whenever a new and likely controversial topic is introduced to the group, have people respond to the original poster rather than to the entire mailing list. Then have the original poster collect all the responses into a single message (and if possible prepare an executive summary) and send that back to the group. You may want to repeat this for several rounds of discussion before opening the topic up for general debate. The idea here is to put all the issues on the table at once so that people don't start a debate before they have all the facts and a general understanding of the concerns of other group members. 6. Hold periodic virtual meetings. This can be done through a conference call, audio or video online conferencing software, an online chat room, or even an agreement that everyone will be online and checking their email at a specified time. Any of these formats should allow for a more or less synchronous debate followed, if necessary, by a vote. 7. If your group has trouble making decisions and is unable to get group members together for a virtual meeting frequently enough, try resorting to an electronic equivalent of Roberts Rules of Order in which the rules of debate are spelled out in great detail. (The nice thing about Robert's Rules is that they have been well established and thus groups can agree to adopt them without arguing over what they should be. Adopting a set of electronic rules for debate may be tricky if your group has to write these rules from scratch. But you may be able to get your group members to agree t
  • o adopt a set of rules written by
  • subcommittee or a neutral party.) Such rules might include the maximum amount of time allowed for a debate before a vote must be taken, the amount of time members have to submit their votes, and the maximum number of words or separate email messages a member may send to the mailing list on a particular topic. I see this mostly as a method of last resort, and I don't recommend writing this into the group's constitution or ground rules unless you've tried it and found it to be effective. 8. Try to find ways for as many of your group members as possible to meet in person. Ideally you would fly everyone to a central location for a group retreat. But financial concerns often don't allow for such luxuries, so do the best you can. Encourage group members to visit their geographically closest neighbors in the group and to meet other members at conferences or when traveling. The more group members get to know each other, the easier collaboration will be. If possible, try to get the entire group together at the beginning of the project and at the end of the project (or for a lengthy project, after every major phase of the project has been completed). Getting the entire group together at the beginning will help the group establish a common sense of direction. Meeting at the end or after the completion of a major phase will provide a sense of closure and an opportunity for group members to evaluate what they have done.
  •  
    This is some collaboration tips.
1More

Teach kids online security basics | Microsoft Protect - 0 views

  •  
    how to keep your child safe online
1More

Parents vs Facebook - 1 views

  •  
    The controversial between Facebook crossing the line or being "ok"! A teenage girl goes on FB after coming home past her curfew and drunk. She get grounded for 5 weeks (no friends or parties) ! She goes and makes a petition on FB (1,000 likes to get her ungrounded") Some teenagers amaze me with how stupid they can be online! Don't ya think that the page would infuriate her parents more instead of arguing her "point"?! Teens like her are the reason good parents are so strict about the internet! Quote: "Facebook is not appropriate." opinions.... they go different ways... this is major conflict!
2More

Effects of Technology on Culture - 0 views

  • Technology has had an outstanding effect on modern society and culture.  It provides us with tools that enhance our ability to network through internet communities which includes anything from online gaming to applications such as Facebook or Twitter.  Internet communities promote freedom of expression that may not be as feasible in real life.  Real life, inevitably, contains many stereotypes and whether we believe in them or not, they are still in existence subconsciously
  •  
    Cultrual! This is a really long article about how cultures overlap. "Technology has had an outstanding effect on modern society and culture. It provides us with tools that enhance our ability to network through internet communities which includes anything from online gaming to applications such as Facebook or Twitter. Internet communities promote freedom of expression that may not be as feasible in real life. Real life, inevitably, contains many stereotypes and whether we believe in them or not, they are still in existence subconsciously"
1More

Get Safe Online :: Safe social networking - 0 views

  •  
    Being social, but safe online.
2More

Statistics - 1 views

  •  
    Facebook is one the most commonly used social networking sites. There are more than 800 million users and more than 70 languages used. More than 350 of Facebook's active users has access to the site on their phone and more than 475 mobile operators work to promote Facebook mobile products. Quote: "More than 50% of our active users log on to Facebook in any given day." -from this website
  •  
    These statistics show that over 800 million people actively use Facebook! Its kind of scary to think that your child has the possibility of being friend-ed by any of them?! Be an aware parent and watch over your child's online activity, but do it form afar! Don't go get on their page! Make your own! That's taking away trust and we are entering a digital age! You need to be on the internet learning just as much as your children do! Quotes: Facts about Facebook: More than 800 million active user More than 900 million objects that people interact with (pages, groups, events and community pages) More than 70 languages available on the site On average, people on Facebook install apps more than 20 million times every day More than 350 million active users currently access Facebook through their mobile devices
1More

Habit Watcher - Free Habit Tracking tool that helps you achieve your goals - 2 views

  •  
    Online tool that tracks habits.
1More

Children's Online Privacy: A Resource Guide for Parents - 2 views

  •  
    Children's online Privacy tips
1More

DCMS holds no evidence on online copyright infringement, lobby group says - Out-Law.com... - 0 views

  • expected to announce a new regulatory regime for tackling online copyright infringement shortly
1More

Overexposed by Nicholas Chen and Edan Freiberger - YouTube - 2 views

  •  
    Just caught up with this video today - another great way to start the conversation about our online life with students.
4More

Justin, Demi, Selena, Rihanna - and COPPA | BCP Business Center - 1 views

  • Justin, Demi, Selena, Rihanna - and COPPA By Lesley Fair October 4, 2012 - 1:29pm It's not likely we'll succumb to Bieber Fever.  We're of a generation more susceptible to the Rockin' Pneumonia and the Boogie Woogie Flu.  But a company that ran official fan websites for pop stars may be feeling the effects of an FTC law enforcement action alleging violations of the Children's Online Privacy Protection Act and COPPA Rule. The defendant, Artist Arena, operated authorized sites for Justin Bieber, Demi Lovato, Selena Gomez, and the mononymous recording artist Rihanna.  (It is, too, a word.  Ask Cher or Fabio.)  Visitors to BieberFever.com, DemiLovatoFanClub.net, SelenaGomez.com, or RihannaNow.com could join fan clubs and subscribe to online newsletters.  Fan club members also had access to social networking functions, like creating personal profiles, posting on walls, or "friending" other members.  Of course, to take advantage of those features, people had to provide personal information. The details of the registration process varied depending on the site, so you'll want to read the complaint for the specifics.  But the 25-words-or-less summary is that Artist Arena allegedly collected kids' names, addresses, email addresses, birthdates, gender and other info without properly notifying parents and getting their consent.  According to the complaint, the company violated COPPA by knowingly registering over 25,000 kids under 13 and collected and maintained personal information from almost 75,000 other kids under 13 who started the sign-up process, but didn't finish it. What about Artist Arena's promises that it wouldn't collect children's personal information or activate kids' registrations without parental consent?  The FTC challenged those claims as false. The settlement imposes a $1 million civil penalty, bars future COPPA violations, and requires the company  to delete the information collected illegally. Looking for specifics on COPPA compliance?  Visit the BCP Business Center's Children's Privacy page.  
  •  
    This Justin Beiber fan site has been penalized more than $100,000 for collecting emails of minors under 13 without parental permission. COPPA compliance is more important than ever. I find it ironic that kids under 13 aren't even supposed to be able to have emails in the first place on many websites. "The details of the registration process varied depending on the site, so you'll want to read the complaint for the specifics. But the 25-words-or-less summary is that Artist Arena allegedly collected kids' names, addresses, email addresses, birthdates, gender and other info without properly notifying parents and getting their consent. According to the complaint, the company violated COPPA by knowingly registering over 25,000 kids under 13 and collected and maintained personal information from almost 75,000 other kids under 13 who started the sign-up process, but didn't finish it."
  •  
    This is important and why kids under 13 cannot get on most social media websites.
  •  
    This article is about kids that obtain info for personal websites without properly notifying parents and getting their consent.
2More

5 Ways to Stay Safe Online | ClickID Blog - 0 views

  • 3. Be Careful with Email Emails are a common source of spam and phishing scams. Avoid opening suspicious emails or clicking questionable links (within emails or without). Even if an email contains a link to a seemingly trustworthy site that you frequent (like your email provider or bank), it is always a good idea to avoid the link and point your browser to the site manually. This can avoid phishing scams. Additionally, simply loading the pictures in a spam message can send information back to its creator notifying them that your email address is an active target. So utilize your email’s spam filter to avoid infected emails from ever loading.
  •  
    One way to protect yourself is by being careful on your email. It is common for phishing scams and spam.
2More

Bridging the Online Language Barrier: Translating the Internet : All Tech Considered : NPR - 0 views

  • But some language combinations work much better than others and even when the translation’s good, it’s never perfect. “Google Translate is good at helping you get what is called a gestation or essentially the essence of what the other person is communicating,” says Goolgle’s Michael Galvez. I’m skeptical that “gestations” will be enough. Much of what we read on the web is written beautifully or full of nuance and software will never be able to translate that. So some translation projects, like a new website called Meedan.net, are still using good ol’ humans. “The idea is a Wikipedia-style approach to translation,” says Meedan founder Ed Bice. Meedan uses a mix of human and machine translation to present articles, blog posts, and comments about the Middle East in hopes of bridging the gap between the Arabic and English-speaking worlds. The comments following an article like this one show how the presentation of the translated text will also be an important issue to tackle. Google Translate essentially wipes out the foreign language, showing you web pages only in your language. Meedan instead has the English and Arabic side-by-side. This layout is a valuable addition to the translations themselves when it allows you to see comments bouncing back and forth between languages.
  •  
    "But some language combinations work much better than others and even when the translation's good, it's never perfect. "Google Translate is good at helping you get what is called a gestation or essentially the essence of what the other person is communicating," says Goolgle's Michael Galvez. I'm skeptical that "gestations" will be enough. Much of what we read on the web is written beautifully or full of nuance and software will never be able to translate that. So some translation projects, like a new website called Meedan.net, are still using good ol' humans. "The idea is a Wikipedia-style approach to translation," says Meedan founder Ed Bice. Meedan uses a mix of human and machine translation to present articles, blog posts, and comments about the Middle East in hopes of bridging the gap between the Arabic and English-speaking worlds. The comments following an article like this one show how the presentation of the translated text will also be an important issue to tackle. Google Translate essentially wipes out the foreign language, showing you web pages only in your language. Meedan instead has the English and Arabic side-by-side. This layout is a valuable addition to the translations themselves when it allows you to see comments bouncing back and forth between languages."
1More

How do people who are from different cultures live and get along with each other in NYC - 0 views

  •  
    The thing that stood out to me the most here, is the word respect. Everyone should have respect for different cultures online. Having respect can get you a long ways in life. "The best way I would believe would be open communication, respect for others beliefs, ethnicity, privacy, and the rights of an individual in general. An action of one person can make a negative or positive impact on society as a whole. If someone chooses to belittle another for something as serious as their beliefs or as trivial as the way they dress, they set in motion negative responses which will inevitably affect many others"
4More

iPredators: Cyberbullying to cyber-harassing troll cop from hell - 1 views

  • Newsletter Subscriptions Newsletter Archives White Papers Webcasts Podcasts This Week In Print IT Jobs Community Slideshows New Data Center Solution Centers Aruba Networks Bring Your Own Device (BYOD) Aerohive Enterprise Networking Solution Center BMC Control-M Workload Automation CA Technologies Executive Resource Center CA Technologies Transform Your IT Strategy Dell 12th Generation PowerEdge Servers Solution Center HP + Microsoft Data Management Appliances & Architectures Network World Accelerating the Cloud Challenge Network World Data Center Challenge 2012 Network World Next Generation Firewall Challenge Network World Wi-Fi Challenge Riverbed Accelerate Business Performance Solution Center Silver Peak's Virtual WAN Optimization Center View all Solution Centers // Network World #nww_header ul.top_nav li.dropdown ul { display:none; } #nww_header ul.top_nav li.dropdown_active ul { background:url("http://www.networkworld.com/includes/styles/r08/img/more-back.gif") repeat-x scroll left top black; cursor:pointer !important; border:1px solid black; position:absolute; margin-top:20px; display:block; width:150px; left:0; } #nww_header ul.top_nav li.dropdown span { background-position:right center; background-repeat:no-repeat; cursor:default !important; padding:0 0 0 6px; color:#000000; height:20px; width:37px; } #nww_header ul.top_nav li ul li { background:none repeat scroll 0 0 transparent; margin-left:0; padding:0; } #nww_header ul.top_nav li.dropdown_active ul li a { background:url("http://www.networkworld.com/includes/styles/r08/img/more-sep.gif") no-repeat scroll left bottom transparent; cursor:pointer !important; text-decoration:none; padding-bottom:5px; padding-left:10px; line-height:11px; padding-top:3px; color:#EEEEEE; display:block; width:130px; } #nww_header ul.top_nav li.dropdown_active ul li.noBackground a { background:none; } #nww_header ul.top_nav li.dropdown_active ul li a:hover { background:url("http://www.networkworld.com/includes/styles/r08/img/more-hi.gif") repeat-x scroll left bottom transparent; padding-right:10px; width:129px; } function isMoreHovering() { $("#morepopupcontainer").bind("mouseleave", function() { $("#morepopupcontainer").hide(); }); $("#morepopupcontainer").show(); } $(document).ready(function() { $('.dropdown').hover( function () { $(this).addClass("dropdown_active"); }, function () { $(this).removeClass("dropdown_active"); } ); }); News Blogs & Columns &lpos=Nav:Ut
  • Back to Microsoft SubnetPrivacy and Security FanaticMs. Smith -- Select Microsoft Subnet Blog --Author expert: Microsoft Expression Web 3Brian Egler's SQL Server StrategiesEssential SharePointManaging MicrosoftMicrosoft Explorer Microsoft InsightsMicrosoft, Google and cloud tech newsMostly MicrosoftPrivacy and Security FanaticRated Critical: A Microsoft Security BlogSecrets of Windows Back Office ServersSQL Marklar The Best Microsoft VideosThe Social EnterpriseWatch Your Assets Previous Article iPredators: Cyberbullying to cyber-harassing troll cop from hellOctober is pegged to raise awareness about cyberbullying, cybersecurity and domestic violence, but an iPredator can play a part in all three. While getting help from the authorities is not always easy, what about when the cyber-creep doing the harassing and trolling is a cop? By Ms. Smith on Wed, 10/24/12 - 12:24pm. window.fbAsyncInit = function() { FB.init({ appId : '147094931979429', //NWW appId channelUrl : '//www.networkworld.com/community/sites/all/modules/nwmisc/channel.html', status : true, // check login status cookie : true, // enable cookies to allow the server to access the session xfbml : true // parse XFBML }); FB.Event.subscribe('edge.create', function(response) { if(typeof(OPG.Tracking.omniture_tl) != 'undefined') OPG.Tracking.omniture_tl('Social Click Complete', 'default'); }); }; (function(d, s, id) { var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) return; js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/all.js#xfbml=1"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); 4 Comments Print document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); clas
  • When it comes to cyberbullying, there are thousands of articles online about the tragic suicide of 15-year-old Amanda Todd and how Anonymous may have unmasked the man who bullied her into sending pictures which he later posted online and sent to her friends. While the man responsible for tormenting the Canadian teenager was a creep and a bully, since an adult was involved then it technically wasn't cyberbullying, according to Stop cyberbullying.
  •  
    October is cybersecurity month and bullying prevention awareness month.
1More

Sexual Harassment in Online Gaming Stirs Anger - NYTimes.com - 0 views

  •  
    women playing xbox live getting harrassed "Over six days of competition, though, her team's coach, Aris Bakhtanians, interrogated her on camera about her bra size, said "take off your shirt" and focused the team's webcam on her chest, feet and legs. He leaned in over her shoulder and smelled her."
2More

ID Theft & Fraud | StaySafeOnline.org - 0 views

  • Ways to Prevent Cybercrime Many cybercrimes start with malware. Criminals use malware to steal personal information and commit fraud. Avoid malware with these STOP. THINK. CONNECT. Tips: Keep a clean machine: Having the latest security software, web browser, and operating system are the best defenses against viruses, malware, and other online threats. Automate software updates: Many software programs will automatically connect and update to defend against known risks. Turn on automatic updates if that’s an available option. Protect all devices that connect to the Internet: Along with computers, smart phones, gaming systems, and other web-enabled devices also need protection from viruses and malware. Plug & scan: “USBs” and other external devices can be infected by viruses and malware. Use your security software to scan them. Protect your $$: When banking and shopping, check to be sure the sites is security enabled. Look for web addresses with “https://” or “shttp://”, which means the site takes extra measures to help secure your information. “Http://” is not secure. Back it up: Protect your valuable work, music, photos, and other digital information by making an electronic copy and storing it safely.
  •  
    Malware is one way criminals steal personal information. To make sure you can avoid malware and be safe you should use these tips.
« First ‹ Previous 161 - 180 of 407 Next › Last »
Showing 20 items per page