Skip to main content

Home/ Digiteen/ Group items tagged Safety

Rss Feed Group items tagged

Vicki Davis

FRONTLINE: growing up online: readings and links | PBS - 0 views

  •  
    List from PBS including some resources from the growing up online series. These are some of the main places you can go for safety information.
  •  
    Bookmarks from the growing up online series for parents.
Vicki Davis

Children's Way - Teaching Kids and Parents Internet Safety - 1 views

  •  
    I highly recommend that elementary and middle schools at least sign up for a school code for woogi world - this is a great tool suggested by Hoover City schools for teaching digital citizenship. My daughter (my intrepid tester of all kid virtual worlds) loves it and says she thinks it is great for kids.
  •  
    Great place to teach digital citizenship for students in elementary ages. Schools can sign up for accounts. Excellent place to evaluate as part of how the www is changing the world and how information is moving between children.
Steve Madsen

Glitch Heightens Facebook Privacy Concerns - NYTimes.com - 0 views

  •  
    For many users of Facebook, the world's largest social network, it was just the latest in a string of frustrations. Related On Wednesday, users discovered a Facebook glitch that gave them access to supposedly private information in the accounts of their friends, like chat conversations.
  •  
    Is private data in Facebook actually safe? Perhaps not. Making use of the privacy settings properly would be part of digital literacy as well as safety.
Kreslyn C

Helping Kids and Families Stay Safe: Workshops on Cyberbullying and On-Line Safety - 0 views

  •  
    Shows how to stay safe from cyberbullying. This page also shows how cyberbulling has become used way more.
Jamie Davis

Get Safe Online - Wikipedia, the free encyclopedia - 0 views

  • website where people can go to get information about internet safety, how to protect themselves online, and practical advice.
Joseph Edore

Solutions for Digital Safety - Youth and Media - 1 views

  • 1. Communication with your daughter or son is key. Build a trusting relationship through dialogue.
  • 2. Create an account to understand how the site works, but not to stalk your kids. They need room to explore, but if you are familiar with the media and technology that they consume, you can provide valuable guidance and suggestions. Surveillance, while possible, damages a trusting parent/child relationship.
  • 3. Ask your kids how they choose to represent themselves and why. Use MySpace as a resource to start a conversation about contemporary fashion, ideals, and media images.
  • ...2 more annotations...
  • 4. Talk about private/ public issues with your kids. Help them to understand the consequences of making certain information publicly accessible. Get them to think through all of the possible audiences who might come into contact with their online information
  • 5. Talk through what kids should do if they receive unwanted attention online or if they find themselves the victims of cyberbullying. A growing number of sites provide useful information about how to confront such problems, including Net Family News , NetSmartz and SafeTeens.
  •  
    "Because being connected is such an integral part of teens’ lives, some youth may hesitate telling their parents about the harassment they encounter for fear that their online privileges will be taken away. The best way to combat cyber bullying or other forms of harassment is not to reign in or limit a teen’s use of technology, but to make sure adults keep the lines of communication open. In addition to keeping the computer in a public space, parents should also become more aware of what their children are doing online. They should consider the Internet as an opportunity to engage in conversation with their children about their interests, talents, and network of friends. It is important to emphasize with youth that there is a distinct connection between what happens online and in the "real world." Adults should communicate to youth that their actions have implications in a real world setting. Regarding cyber bullying in particular, adults must also relay traditional techniques of combating bullying, among them being to report incidents, keep records, and not to engage the bully. “It’s not new bullying, it’s just a vehicle,” says Nancy Mullin-Rindler, director of the Project on Teasing and Bullying at Wellesley College (Paulson, 2003). In addition, because research has shown that the majority of cyber bullies have been victims of traditional bullying, this approach—-combating the behavior versus limiting the technology—-would ultimately help in preventing both cyber and conventional bullying. Cyber bullying poses a stickier problem for schools that are finding themselves in the middle of First Amendment debates. Despite the fact that whatever happens online (no matter where the location) typically spreads to the school environment, inevitably impacting students’ learning, does a school principal have the right to punish someone for what they say outside of school parameters? Because of this legal quagmire, schools’
Joseph Edore

GetNetWise | Online Safety Guide - 0 views

  • Keeping children safe on the Internet is everyone's job. Parents need to stay in close touch with their kids as they explore the Internet. Teachers need to help students use the Internet appropriately and safely. Community groups, including libraries, after-school programs, and others should help educate the public about safe surfing. Kids and teens need to learn to take responsibility for their own behavior -- with guidance from their families and communities. It's not at all uncommon for kids to know more about the Internet and computers than their parents or teachers. If that's the case in your home or classroom, don't despair. You can use this as an opportunity to turn the tables by having your child teach you a thing or two about the Internet. Ask her where she likes to go on the Internet and what she thinks you might enjoy on the Net. Get your child to talk with you about what's good and not so good about his Internet experience. Also, no matter how Web-literate your kid is, you should still provide guidance. You can't automate good parenting.
Vicki Davis

Wise Up about Wi-Fi: Tips for Using Public Wireless Networks - OnGuard Online - 1 views

  •  
    Tips from the FTC about using public wireless networks - this is important information for students and adults to know.
Steve Madsen

Online bullying: Teachers to get cyber safety training program - 0 views

  •  
    "AUSTRALIAN school teachers will have access to a new cybersafety training program, helping them to protect students from cyberbullying, sexting and grooming by internet predators."
Suzie Nestico

Digital Citizenship in Schools | Scoop.it - 3 views

  •  
    Judy O'Connell's curated tweets, blogs, etc. on digital citizenship. Excellent, constantly updated resources.
Kevin Shrestha

Biometrics Security: Thumbs Down? - IT Security - 0 views

  •  
    Though biometrics are becoming commonplace, the debate rages over whether they're effective.
Riley F.

123digitalcitizenship - Digital Health and Wellness - 1 views

  • Digital Citizenship is a term used to describe the proper use of the internet by different people or groups. It sets guidelines for appropriate utilization of web tools and websites to ensure a safe online-environment. One of the nine vital branches of Digital Citizenship. It is a word used to describe the mental and physical well-being when using the internet. This may include: ergonomics, the physical well-being and the posture of the body while using the internet and safety of important body parts, such as the eyes. This branch of Digital Citizenship also emphasizes the potential risks and dangers when using online websites, such as hackers and pedophiles.
  •  
    This web site gives me at of good info.... along with a good and proper definition.
  •  
    this is an overview of what digital health and wellness is.
Julie Lindsay

Digital Safety in an Interconnected World - 0 views

  •  
    Proceedings from conference in UK
Toni H.

Microsoft Online Safety - 0 views

  •  
    protect your computer
Brody C

Safety and Security on the Internet - 0 views

  • Why Should I Worry About Security? The Internet is a global collection of Interconnected Networks that facilitate information exchange and computer connectivity. The Internet is comprised of many different computers, all of which fall into two categories: servers (also known as "hosts") and clients (also known as "guests") -- technically, everything on the Internet can be considered a "host," but for this discussion, we'll use "hosts" and "guests." Guest machines send bursts of computer data called "packets" which are analyzed by the server belonging to the guest's Internet service provider. If the data is located locally (on the ISP's machine), the ISP's server will return the packets. If the information sought is not local (on another machine), the ISP's server hands off the packets to a router, which then sends the packets to the server containing the information. Once the information is located, it is sent back to the guest machine. There are many different types of computers that fill these two categories: mainframes, minicomputers, PCs, Macintosh, Unix and others. Despite the many varieties of computers that combine to form the Internet, every computer connected to the Internet needs to be able to communicate with every other computer -- without this ability, there is no Internet. All of these computers are able to communicate because in a sense they can all speak the same language -- TCP/IP. TCP/IP actually isn't a language; it is in computer terms what is known as a "protocol." A protocol is simply a standard for transmitting and receiving bits of information. As long as all of the interconnected computers follow the same protocol, they can exchange information. Unfortunately, when data is sent from one computer to another on the Internet, every other computer in between has an opportunity to see what's being sent. This poses an obvious security problem.
  • Say you decide to purchase concert tickets on the Web. To do so, you need to fill out an electronic form with your name, address and credit card number. When you submit the form, your information passes from computer to computer on its way to the concert ticket web server. It is possible that someone could be watching the data passing through one of the computers that is in between your computer and the concert ticket server. No one knows how often this happens, but everyone concedes it is technically possible. And its also possible off the web, too -- E-mail can be captured (and read, if not encrypted), as can file transfers via unsecure FTP. If someone wanted to, it wouldn't be too difficult to connect a capture device to someone's phone line (assuming they use a modem to connect to the Internet) and steal an electronic copy of the data exchanged on the Internet. Even if you make your purchase on a secure web site supporting the latest security features, it has been recently shown that secure sites can cause Internet Explorer (and other browsers) to send sensitive information to a non-secure server in plain text format.
  • The point is, there are a lot of security issues related to a network such as the Internet. No FAQ could possibly cover them all. That is why this FAQ concentrates on Internet Explorer. Because there are millions of people who use Microsoft Windows family products, and because those millions have the ability to blend Internet Explorer with these products, the seriousness about security should be of paramount importance to everyone. Remember,  software products are only as secure as the environment in which they operate.
  • ...2 more annotations...
  • What Security Features does Internet Explorer Have? Internet Explorer is a safe browser in many ways. The latest version of IE supports Secure Socket Layer (SSL) 2.0/3.0, Private Communication Technology (PCT) 1.0, CryptoAPI, and VeriSign certificates, and one version employs 128-bit encryption, one of the strongest forms of encryption that's commercially available for use over the Internet. To see if you have the 128-bit version of Internet Explorer, go to the Wells Fargo Bank site and take their browser test. "Secure Socket Layer (SSL) is a Netscape-developed protocol submitted to the W3C working group on security for consideration as a standard security approach for World Wide Web browsers and servers on the Internet. SSL provides a security "handshake" that is used to initiate the TCP/IP connection. This handshake results in the client and server agreeing on the level of security they will use and fulfills any authentication requirements for the connection. Thereafter, SSL's only role is to encrypt and decrypt the byte stream of the application protocol being used (for example, HTTP). This means that all the information in both the HTTP request and the HTTP response are fully encrypted, including the URL the client is requesting, any submitted form contents (such as credit card numbers), any HTTP access authorization information (usernames and passwords), and all the data returned from the server to the client." -- Microsoft's IIS 1.0 Features Tour. It has been reported, however, that SSL has been cracked. Private Communication Technology (PCT) is a Microsoft-developed security protocol available in IE only. According to their Internet draft, "The Private Communication Technology (PCT) protocol is designed to provide privacy between two communicating applications (a client and a server), and to authenticate the server and (optionally) the client. PCT assumes a reliable transport protocol (e.g., TCP) for data transmission and reception. The PCT protocol is application protocol-independent. A "higher level" application protocol (e.g., HTTP, FTP, TELNET, etc.) can layer on top of the PCT protocol transparently. The PCT protocol begins with a handshake phase that negotiates an encryption algorithm and (symmetric) session key as well as authenticating a server to the client (and, optionally, vice versa), based on certified asymmetric public keys. Once transmission of application protocol data begins, all data is encrypted using the session key negotiated during the handshake." IE also supports server and client authentication by using digital certificates to identify users to web servers. In addition, IE supports code signing with Authenticode, which verifies that downloaded code has not been modified. For more information on Authenticode, visit Microsoft's Authenticode page or the excellent Authenticode FAQ page. CryptoAPI 1.0 provides the underlying security services for the Microsoft Internet Security Framework. CryptoAPI allows developers to integrate cryptography into their applications. Microsoft has given a great deal of thought to the issue of security and it products, and Internet Explorer 4.0 is no exception. From "Security Zones" to continued support and refinement of Authenticode, IE4 promises to be one of the safest browsers of all time.  You can read all about the security available in IE 4 at http://www.microsoft.com/ie/ie40/?/ie/ie40/features/ie-security.htm. Also, check out what Microsoft is doing to keep transactions private with IE 4.
  • What are "Cookies?" Cookies are small text files that are sent to web browsers by web servers.  The main purpose of cookie files are to identify users and to present customized information based on personal preferences.  Cookie files typically contain information such as your name (or username), password information, or ad-tracking information.  There is a good body of literature on  the Internet about cookies.  Despite what you may have read or heard, most people, including myself, do not view cookies as any kind of a security threat.  However, because of the way cookies work (e.g., a web server storing a text file on someone's hard drive), Microsoft (and other browser manufacturers) have built options into their browsers that notify users when cookies are being passed to them, and give the user an option to prevent the cookie from being accepted.  I don't think this is a good idea.  By rejecting cookies, your browser may not display the entire page or the site may not function as intended. The reality is that cookies are text files -- they cannot contain viruses or execute applications, they cannot search your hard drive for information or send it to web servers, and most of the information they contain is simple tracking information designed to effect better customer service.
  •  
    safe things to do on the Internet and what to learn that is big
Toni H.

Online Predators - Child Safety - Microsoft Protect - 0 views

  •  
    protect your family
Vicki Davis

My Child is a Cyberbully, What Do I Do? | Webroot Software - 0 views

  •  
    Tips for parents to help their child with cyberbullying. "Research suggests that between 10 - 20% of students will be a cyberbully at some poin"
Merritt D

Parents vs Facebook - 1 views

  •  
    The controversial between Facebook crossing the line or being "ok"! A teenage girl goes on FB after coming home past her curfew and drunk. She get grounded for 5 weeks (no friends or parties) ! She goes and makes a petition on FB (1,000 likes to get her ungrounded") Some teenagers amaze me with how stupid they can be online! Don't ya think that the page would infuriate her parents more instead of arguing her "point"?! Teens like her are the reason good parents are so strict about the internet! Quote: "Facebook is not appropriate." opinions.... they go different ways... this is major conflict!
« First ‹ Previous 161 - 180 of 193 Next ›
Showing 20 items per page