Skip to main content

Home/ Digiteen/ Group items tagged Technology

Rss Feed Group items tagged

Brandon P

Game app teaches kids social networking safety - TODAY Tech - TODAY.com - 0 views

  • to help kids understand responsible online behavior such as securing their personal information, protecting their privacy and defending their peers against cyberbullying
  • “It’s never too early to talk to kids about safe online behavior, particularly when accessing social networks,”
  • “Using the Internet is an important life skill. As parents introduce new technology to their kids, this is another tool they can use to help their kids make good choices.”
  •  
    Application that teaches kids social networking safety.
  •  
    help kids understand responsible online behavior such as securing their personal information, protecting their privacy and defending their peers against cyberbullying "It's never too early to talk to kids about safe online behavior, particularly when accessing social networks," says Lynette Owens, director of Trend Micro Internet Safety for Kids & Families. "Using the Internet is an important life skill. As parents introduce new technology to their kids, this is another tool they can use to help their kids make good choices."
  •  
    "The free mobile app BeSeen - launched in partnership with Web Wise Kids, a nonprofit specializing in Internet safety - is a single-player game that replicates a social networking site where players create a profile and travel through a condensed school year. To earn rewards, the player must make positive choices when presented with challenging social situations and solve puzzles along the way. The game is designed to help kids understand responsible online behavior such as securing their personal information, protecting their privacy and defending their peers against cyberbullying"
Garrett E

Why Cell-Phone Health Concerns Persist - 0 views

  • Arjen Witzel Feb 18, 2010 7:07 AM GMT Effects ofexposure to emf radiation/ mobile phone/ wireless and related technology at my body are :Headache Fatigue Stress Sleep disturbances Skin symptoms like prickling, burning sensations, rashes, muscle pains and aches and more.But Doctors can't emplane any of this in Nederland.I lost my lob two times now.And can't start a new one because of my state of health.To keep alive at home i have rebuild my rand house in a cage of Faraday.Outside it 800/2200 uW/m2 from cell-towers and radiated devices from next door.Inside 0,4uW/m2 where i now can sleep properly.Before that impossible to get to sleep.Around me many people have the same problems, and the don't no what is the problem jet!Taking many medicine for nothing just like me in the past.I have nu future any-more. Adam Nov 6, 2009 6:38 PM GMT I have used a number of cell phones over the past 10 years. Its easy for me to say that my eye twitching, localized piercing head aches, tremors, etc are the result of this phone but it can not be proven. I do not have a home phone, I use my cell as my primary phone end never really thought that it may be the cause of head/brain issued until recently. My question... are the blue tooth devices really any better? do they not still pick up and transmit the same waves as the hand held device I have spent so much time holding next to my brain? i wish a few real studies not conducted or funded by the phone companies would surface... we need the help. Virginia Farver Sep 22, 2009 9:45 PM GMT I'm writing in behalf of my Son, Richard Blaine Farver,(Rich). Rich, died of glioblastoma multiforme brain cancer Oct.11,08 at the age of 29. Rich always had his cell phone on his head or in his pocket! Like millions of other kids he had used it for the last several years. His tumor was on the right side of his head, and he was right handed! Rich was also a graduate student at SDSU in San Diego,CA. In March of 09, articles were written about Rich and one other man that died in 2008 from glioblastoma, one died in the 90's from glio, and one is currently battling a malignant brain tumor. The articles are about a particular building and room on SDSU campus. 'Nasatir, room 131.' I found these articles in August 09. I KNOW, cell phone use caused my Son's cancer and the public needs to take this Very seriously! There is a cell tower next to this building, room, also! The, "It won't happen to me," attitude needs to be changed!! Everyone heed my WARNING! It can happen to any one! This has destroyed our lives! Please, I DO NOT want anyone else to endure this, or their families!Sincerely,Virginia Farver
  • been around for over 20 years, and they're now used by more than 3 billion people
  • including cancer
  • ...9 more annotations...
  • "Although the evidence is still controversial, I am convinced that there are sufficient data to warrant issuing an advisory to share some precautionary advice on cell-phone use," wrote Ronald Herberman in a memo to 3,000 faculty and staff in late July.
  • director of the University of Pittsburgh Cancer Institute, who warned school employees to limit their cell-phone use
  • many studies
  • "The overwhelming majority of studies that have been published in scientific journals around the globe show that wireless phones do not pose a health risk," said the Cellular Telecommunications & Internet Assn., the wireless industry's trade group
  • wireless industry, from Nokia (NOK) and Motorola (MOT) to Verizon Wireless and AT&T (T), says there is no cause for concern
  • definitive scientific proof is tough to come by
  • them hard to study
  • mainstream products for only 10 years or so, and it may take much longer than that for adverse effects to show up
  • "The most difficult thing to resolve is whether there is an effect with long-term mobile-phone use," says Rodney Croft, executive director at the Australian Center for Radio Frequency Bioeffects Research.
  •  
    "Mobile phones have been around for over 20 years, used by more than 3 billion people." "can contribute to health problems, including cancer?" director of the University of Pittsburgh Cancer Institute, who warned school employees to limit their cell-phone use based on early unpublished data from scientific studies. "Although the evidence is still controversial, I am convinced that there are sufficient data to warrant issuing an advisory to share some precautionary advice on cell-phone use," wrote Ronald Herberman in a memo to 3,000 faculty and staff in late July. The wireless industry, from Nokia (NOK) and Motorola (MOT) to Verizon Wireless and AT&T (T), says there is no cause for concern. "The overwhelming majority of studies that have been published in scientific journals around the globe show that wireless phones do not pose a health risk," said the Cellular Telecommunications & Internet Assn., the wireless industry's trade group, in a statement following Herberman's memo. Questions that there are adverse effects with long-term mobile phone use.
Callie S

11 Ways to Stay Safe Online & Protect Your Privacy - FindLaw.com How-To - FindLaw Insider - 0 views

  • 11 Ways to Stay Safe Online & Protect Your Privacy By Nerissa Sardi on September 1, 2009 2:25 PM | No TrackBacks Nearly everyone is using the internet these days to find information or connect with others. But surfing the web can still sometimes feel like the Wild West. Despite technological advances to help reduce the risk of identity theft, becoming the victim of an internet scam or having your privacy invaded is a persistent threat. And, as a number of recent incidents involving social networking websites have shown us, it can even be fatal Keeping your guard up is essential to avoid trouble on the internet. Here are eleven tips from FindLaw.com to help you stay safe online: 1. Be careful who you give your information Avoid giving out personal information such as your name, address, telephone number or other personal information on websites until read and understand their privacy policy. For example, be on guard for online promotions or contests in which you may be asked to provide details about yourself. This information could be used to market to you in the future. Never give out your Social Security number or passwords online, unless you are certain the site is secure. 2. Know you're being watched Be careful of the e-mails you send and the websites you visit while at work. In most U.S. states, employees are exempt from protection by employers who may be monitoring e-mails and internet use while on the job. 3. Don't reply to spamEver get one of those strange, unexpected e-mails for real estate, weight loss, work-at-home or investment opportunities? Your best bet is to delete those e-mails without opening them. Never reply to these e-mails, even to request they remove your name from their lists. Replying will alert the sender that your e-mail is a "live" e-mail attached to an actual person.  4. Use secured websites Before you purchase a product or service online with a credit card, make sure the connection is secure or encrypted. Look for a small lock icon on the website, or look at the URL address line; a secure connection will begin with https:// ("s" for secured) instead of http:// 5. Beware of public wireless accessDon't send personal or confidential information when using public wireless connections in cafes and other public places. Fellow wireless users could potentially monitor what you are doing only a few feet away. 6. Think before you post Avoid revealing personal information or photos on websites such as Facebook, MySpace or SecondLife. Personal or embarrassing information and images can haunt you in years to come like when you are applying for college or a new job. If it's on the internet, it's available for a potential employer, your school, a future or current spouse, your mother or grandmother to find it. 7. Don't trust your friends A number of recent incidents involving "sexting" demonstrate, sending photos of yourself in the nude or in compromising positions could not only be extremely embarrassing when a partner or ex-partner starts to share those photos with his or her friends, but it also could be illegal. 8. Beware of classified listing meet-upsWhen using websites such as Craigslist or Freelist to buy or exchange goods locally, always bring someone you trust with you to meet the seller/buyer. Be cautious about letting strangers into your home or meeting in unsafe places 9. Watch your cookies Cookies are tidbits of information that websites store on your computer. Some cookies are useful, such as those that store information about you so you don't have to retype info every time you go to that site. Other cookies are used to track your motions through a website. Some companies keep this data for their own usages - however, some sell your information to other marketers. You can monitor and edit the cookies on your computer through your browser. 10. Use anti-spyware Spyware is sneaky software that rides its way onto computers during the download of screensavers, games, music and other applications. Spyware sends information about what you're doing on the internet to a third-party, usually to target you with pop-up ads. Anti-spyware will help block this threat. 11. Monitor your kids' internet useMove computers out of the bedroom and into family space where parents and others can check on your child's internet use by simply walking by. Set specific times that your child may surf the web, and set rules about social media websites, such as Facebook, My Space and Twitter.
  •  
    If you follow these 11 rules you will be safer on line and your identity will be more protected.
Dru F

Technology's Language Barrier - Forbes.com - 0 views

  • Blunders like these can be costly. And as burgeoning markets in Asia increase in importance, new insight is required to break through what you could call a language barrier.As a result of the globalization of business through mergers and international investment, English has become a lingua franca. Almost two billion people worldwide speak it, and more than half of these learned it as a second language. Moreover, global popular culture is dominated by English-language television, music, film, print and social media.
  •  
    The language barrier can present problems in interactions when different languages are being used in business. "Blunders like these can be costly. And as burgeoning markets in Asia increase in importance, new insight is required to break through what you could call a language barrier. As a result of the globalization of business through mergers and international investment, English has become a lingua franca. Almost two billion people worldwide speak it, and more than half of these learned it as a second language. Moreover, global popular culture is dominated by English-language television, music, film, print and social media."
Callie S

Tips on how to stay safe online - South Florida Sun-Sentinel.com - 0 views

  • General security Don't use public or shared computers for online banking or investment transactions. Don't give out your account password to anyone, even someone claiming to be from your online service. Your account can be hijacked, and you can find unexpected charges on your bill. Be careful about giving out your credit card number, phone number and home address. Never provide your Social Security number to anyone unless required by law. Email is relatively private -- but not completely. Don't put anything into an electronic message that you wouldn't want to see posted on a neighborhood bulletin board. Delete junk email without even reading it. Never download an email attachment from an unknown source. Opening a file could expose your system to a virus. Be cautious about opening any attachment or downloading any files from emails you receive, regardless of who sent them. These files can contain viruses or other software that can weaken your computer's security. Don't "unsubscribe" on unwanted, un-requested or unsolicited e-mail. That just lets the senders know that they had reached a valid email address. Don't sign up for free offers. Shopping online Know who you're dealing with. Confirm the online seller's physical address and phone number in case you have problems. Know what you're buying. Read the seller's description of the product closely, especially the fine print. Name-brand items at unusually low prices might be stolen or counterfeit. Know what it will cost, including shipping and handling. Never send cash. Pay by credit or charge card. If you pay by credit or charge card online, your transaction will be protected by the Fair Credit Billing Act. Under this law, you have the right to dispute charges under certain circumstances and temporarily withhold payment while the creditor is investigating them. Check out the terms of the deal, like refund policies and delivery dates. A Federal Trade Commission rule requires sellers to ship items as promised or within 30 days after the order date if no specific date is promised. Phishing and identity theft You may receive emails that appear to be from a financial institution, bill paying service, government agency or other business that say something like: "We suspect an unauthorized transaction on your account. To ensure that your account is not compromised, please click the link below and confirm your identity." Do not reply, and do not click on the links. The messages direct you to a website that looks legitimate, but it is a trick to get you to reveal personal information and passwords. Operators can steal your identity and run up bills or commit crimes in your name. Forward these emails to the Federal Trade Commission at spam@uce.gov and to the company, bank, or organization impersonated in the email. Most organizations have information on their websites about where to report problems. Email is not a secure method of transmitting information, so never use it to transmit financial information. Legitimate businesses should not ask you to send sensitive information by email. Area codes can mislead. Some scammers send an email that appears to be from a legitimate business and ask you to call a phone number to update your account or access a "refund." Because they use voice over internet protocol technology, the area code you call does not reflect where the scammers really are. Review credit card and bank account statements as soon as you receive them to check for unauthorized charges.
  •  
    Here are tips to ways to protect your general security,identity, and yourself when shopping online. If you follow these simple rules you will be safer when online.
Haley M

Fair Use - Copyright and Fair Use - Library Guides at Polytechnic Institute of NYU - 0 views

  • What is Fair Use?Fair use is a concept embedded in U.S. law that recognizes that certain uses of copyright-protected works do not require permission from the copyright holder. (See Title 17, section 107) What Determines Fair Use?The following four factors are used to determine if a use is fair: The purpose of the use (eg. commercial vs. educational)* The nature of the copyrighted work The amount of the material used (the greater the amount copied, the less likely it is fair use) The effect of use on the potential market for or value of the work * Not all uses in an academic context are automatically considered fair use!  Fair Use in AcademiaThe Fair Use Doctrine is probably the most important exemption to copyright protections for educational settings, allowing many uses of copyrighted works for the purposes of teaching and research. The complexity of fair use and its importance in academia make it imperative that every member of NYU-Poly understands how to make judgements concerning fair use. Review these Common Scenarios to help you determine whether or not fair use is appropriate. Tools to help you Determine Fair Use Fair Use Analysis Tool:  guides users through the process of determining if a use is fair. Developed by The University of Minnesota Libraries. Fair Use Evaluator: helps users collect, organize, and document the information they may need to support a fair use claim, and  provides a time-stamped PDF document for the users’ records. Developed by the American Library Association, Office for Information Technology Policy.  
October H

Senators say digital privacy law covers smartphones - The Hill's Hillicon Valley - 0 views

  •  
    "The law that protects private computers from unauthorized access also applies to smartphones and other electronic devices, according to a letter from two Democratic senators."
  •  
    Not only does the law protect computer, but also is protecting our smartphones.
Blakelee H

Cyber-Bullying and its Effect on our Youth - 2 views

  • Between cell phones, social media Web sites, and online gaming, children today seem to have more outlets for interacting with each other virtually than they do for interacting with each other in person. However, with all of the good social interaction that is done as a result of these technologies also comes the bad. In addition to the physical and verbal bullying that may take place at school, cyber-bullying in the form of harassing text messages and derogatory posts on children’s Facebook pages is now commonplace. Even though it may not take place in person, the emotional and psychological effects of cyber-bullying are just as destructive. Since new media and cell phones are harder to track and monitor, parents need to take preventive measures that can help minimize the effects of cyber-bullying on their children. 
  •  
    Cyber bullying takes a bad affect on health of today's youth.
Jenna A

download - 0 views

  •  
    "The second wave industrial revolution was associated with broad effects to expand the literacy in schools, libraries, so as to incorporate people in to work and life. Policymakers, scholars, public institutions and grassroots movements are striving for broad computer literacy. "
  •  
    This is about the literacy throughout technology, schools, and the public.
Maggie B

BrainPOP Jr. | Internet Safety - 1 views

  •  
    Provides educational movies for K-3 students. Homework Help, leveled quizzes, games and activities for kids. Exceptional resource for teachers and homeschools.
Michael Kucharski

TeenTech Weekly: Research pledges, digital literacy, student tracking | ZDNet - 0 views

  •  
    This edition of TeenTech weekly rounds up Generation Y and student technology news that you may have missed. This week we've read about university research budgets, the result of Dharun Ravi's webcam case, student monitoring and the future of the digital economy.
Mark Meyers

Google Web Search Lessons for Students - 2 views

  •  
    I'm finding that my students, just like me, are not using the full power of the Google search engine. We search and click on the first few results, taking the information as valid and relevant. These lessons explain how Google works and how to get better results. I plan to incorporate this into my Digiteen curriculum.
Savana R

Internet Privacy - Recent Court Cases, Issues and Articles | American Civil Liberties U... - 1 views

  •  
    Recent court cases in the US where privacy on the internet is debated
  •  
    The government is getting into our personal life by, invading our privacy. "Today, private companies are tracking as many of our movements as they can online, selling that information to other companies who in turn share it with law enforcement and the government. "
« First ‹ Previous 161 - 180 of 269 Next › Last »
Showing 20 items per page