Skip to main content

Home/ Digiteen/ Group items tagged US

Rss Feed Group items tagged

Haley M

Fair Use - Copyright and Fair Use - Library Guides at Polytechnic Institute of NYU - 0 views

  • What is Fair Use?Fair use is a concept embedded in U.S. law that recognizes that certain uses of copyright-protected works do not require permission from the copyright holder. (See Title 17, section 107) What Determines Fair Use?The following four factors are used to determine if a use is fair: The purpose of the use (eg. commercial vs. educational)* The nature of the copyrighted work The amount of the material used (the greater the amount copied, the less likely it is fair use) The effect of use on the potential market for or value of the work * Not all uses in an academic context are automatically considered fair use!  Fair Use in AcademiaThe Fair Use Doctrine is probably the most important exemption to copyright protections for educational settings, allowing many uses of copyrighted works for the purposes of teaching and research. The complexity of fair use and its importance in academia make it imperative that every member of NYU-Poly understands how to make judgements concerning fair use. Review these Common Scenarios to help you determine whether or not fair use is appropriate. Tools to help you Determine Fair Use Fair Use Analysis Tool:  guides users through the process of determining if a use is fair. Developed by The University of Minnesota Libraries. Fair Use Evaluator: helps users collect, organize, and document the information they may need to support a fair use claim, and  provides a time-stamped PDF document for the users’ records. Developed by the American Library Association, Office for Information Technology Policy.  
Rachel H

Dell - Healthy Internet Habits | Dell - 0 views

  • Talk About It Talk with your kids about the Internet, and encourage them to see it as a shared, open environment in which they have social responsibilities just as they would in any physical environment.With open discussion, you can set expectations about the behavior you expect from them, curb negativity and discourage behaviors such as secrecy, boundary-pushing or thrill-seeking. You can also emphasize that online safety is something you care about and will continue to examine.Keep in mind: Enjoy the Internet along with your children, and discuss the ways in which it brings value into your lives.Stay open to your kids' questions, and encourage them to share their Internet experiences with you without fear of punishment about what they read, see or experience.Discuss how to safely interact online with others, why kids should stay away from certain types of content and individuals, and that Internet rules are there to protect kids. Teach children to trust their instincts, and to come to you if something or someone online makes them feel uncomfortable or threatened. Stay calm and remind them that they are not in trouble for bringing issues to your attention. Praise their discretion.As kids get older, keep family communications about the Internet as open and positive as you can. Talk with your kids about their online friends and activities just as you would talk about other friends and activities.
  • Set Rules for Internet Use Lay out rules for Internet use, setting clear expectations for your kids' online habits. A good set of rules should include things like the amount of time kids are allowed to be online, what types of content are appropriate and who it's okay to chat with as well as proper online conduct and good Internet citizenship.Keep in mind: The most successful rules are those that are created collaboratively. Work with your kids to draw up an online family safety contract that the whole family can agree to and sign. Discuss the rules frequently. Remind them that the rules are in place to protect your family, and that strictly maintaining privacy online can lower the risk of being targeted by online predators. Tell kids that following the rules and keeping communications open will allow them to gain freedoms as they get older. Let them know that you will reevaluate the rules over time. You can reinforce the rules you set by enabling restrictions on your PC. Windows Live Family Safety lets you set parameters that can limit Internet searches, monitor and filter specific websites, receive detailed activity reports of your child’s online activities, and let you be in control of who your child can communicate with in Windows Live Spaces, Messenger, or Hotmail1.
  • Balance Time Online Maintaining a balance between entertainment and other activities in kids' lives can be a serious challenge. The Internet has made it even more difficult, as the lines between entertainment and education are often blurred. Modeling a healthy balance between your online and offline activities is a great way to encourage children to do the same.Keep in mind: Enforce rules about the amount of time your kids may spend online, and the hours they are allowed to go online. Help your kids develop self-control, discipline and accountability regarding Internet use. Use parental controls in Windows 7 to limit PC time. Set up individual user accounts to determine how much computer time children have and what hours of the day they are allowed to use the PC, as well as which programs and games they can access.Encourage and support their participation in other activities — particularly physical pastimes with other children. If your child is reluctant, look for offline activities that tap into the same interests your kids pursue online. Watch for signs of Internet dependency. If Internet use seems excessive or begins to affect your child's school performance, health or relationships, consider professional counseling for Internet addiction.
  • ...2 more annotations...
  • Distinguish Between Fact and Opinion Let's face it: There's a lot of content on the Internet that isn't helpful or reliable. While more online fact checking happens today than previously, the ability of nearly anyone to offer opinions or build Web sites can make the Internet a confusing place for young people.Teach your kids how the Internet works, and encourage critical thinking. Train them to use a variety of online resources and to always check, question and verify what they see online. Ultimately, these skills can help your kids avoid bad situations and individuals — such as online predators — that may seek to mislead or trick Internet users. Keep in mind: Start young. Even preschool students use the Internet to look up information. Teach them early to distinguish fact from opinion, and discuss ways to recognize bias, propaganda and stereotyping.Challenge your kids to evaluate what they see online by asking: What is the purpose of this site? To entertain? To sell? Does it provide the author’s contact information or an "About Us" section? Does a company or an individual person sponsor it? Is it a public conversation? Finally, challenge them to consider whether the Internet is the best place to find the information they need.Discuss racism and other forms of hatred with your kids. Software filters can help block hateful material, but critical thinking and an awareness of history and world events can help children recognize more subtle biases.
  • Keep Personal Facts Private Online privacy is vital to your family's safety. Ensuring that your kids communicate online only with people known to them and your family can help limit their contact with unsavory elements. Still, as kids grow older, they are bound to make new friends online. As your kids grow into middle and high school, the most recent research shows that the greatest threat to their safety is actually from people in their own age group, or slightly older.Keep in mind: Ensure that children keep facts such as their real name, age, gender and location private. Discuss how details in photographs can reveal more information to would-be predators than your child intends.Many kids routinely visit social networks and blogs where they may post pictures, make comments and write personal entries. Insist that your kids keep personal information private and that they think twice before joining location-based peer groups that may give away information on their whereabouts.Ensure that your kids understand the risks involved in making private or personal information public online. Keep an open dialogue about the people they come into contact with online. Discuss and evaluate online relationships as you would any other relationships in your child’s life. In this section, we covered some basic knowledge all parents should keep in mind when their children are online. Impress upon your kids the seriousness of online safety concerns, while making sure to keep the lines of communication open and non-judgmental. In the next section, we’ll look at ways to ensure your family’s privacy online isn’t compromised.
  •  
    healthy habits for online
Kelby W

Privacy Tips - 0 views

  •  
    Not all websites are trust worthy. Here are some tips to help be a little more safe with your privacy online. "TIP #1: Do Some New Year's (Data) House Cleaning Get New Passwords: Use different, strong passwords for each of your online accounts so if one is compromised the rest are safe. Strong passwords contains letters, numbers, different cases, and symbols. Check your password's strength here. Close Old Online Accounts: Unused online accounts are a liability. Hackers could use them to infiltrate your more important accounts . Get rid of them. If you can't remember where you have old accounts search your email inbox with queries like "registered", "confirm" or "your account" to find email records of old accounts. Cull Your Friends List: You put a lot of information about yourself on social networks. Would you want that friend of a friend you met once, two years ago to be carrying around a physical copy of all that information? Probably not. Keep the people you know and trust. Delete the rest. Go Paperless: Still receiving bank statements and doctors' invoices by mail? You don't need your Social Security number floating around in your trash can on the curb outside. Call your bank, doctor, credit card company etc. to find out if you can go paperless and manage your records via a secure online portal. You'll save a tree and protect your privacy. Shred Sensitive Documents: Those credit card and health savings account statements you don't need that have been sitting in that folder in your desk? They're a privacy liability. Get rid of them (securely, using a shredder). Privacy Tips Browser Privacy  Back to top Web browsers have evolved into highly customizable software platforms capable of controlling and protecting much of the information that flows between you and the parties you interact with online. Modern browsers have an impressive array of privacy enhancing capabilities and options. They can, for example, warn you before you visit suspicious or fraudul
Ashley M

digiteen2008 - Digital Literacy - 0 views

  • Some teachers are trying to use digital literacy in there classrooms daily to try to help students become involved. Our teachers use overhead projectors, smartboards, and televisions.Many of us use computers in our classes. If we do not learn how to use computers we could soon be separated by the digital divide. The digital divide could end up leaving some of us jobless. We need to be able to use all of the technology we have access to so we can succeed. In a article called "Digitally addicted kids threaten to return to civilization to the dark ages" a girl named Megan Meier committed suicide due to Cyber bullying. A kid named Josh Evans did this, who later turned out to be Megan's ex boyfriends mom Lori Drew. There are so many examples of digital literacy. We use them in everyday life. We use computers all the time, don’t we? I know if you work in an office then you do. Also, Teens are in love with text messages, although text messaging can be very harmful. While texting you could be bullying someone. Like I said before about computers, not only do business people use them, but parents and teens, and maybe some younger children. Teens get in chat rooms all the time. Some probably don’t even know what they are getting into. In chat rooms people can be pushed to do something or even be bullied. Chat rooms and the use of text messaging can be harmful.
    • Ashley M
       
      This information is very informative.
  • The digital divide could end up leaving some of us jobless
    • Ashley M
       
      This sentence is very true. The information in the following paragraph explains how the digital divide could leave some of us jobless.
  • Tasks are being accomplished with the use of technology more than ever.
    • Ashley M
       
      I find this fact very true.
  • ...3 more annotations...
  • Relying too much on technology is a problem because it isn't always reliable.
    • Ashley M
       
      I also find this very true..The following statement explains how relying on technology too much could be a negative thing.
  • Digital literacy is trying to teach basic computer concepts and skills. Literacy isn’t being able to read and write, like used to be. It deals with being able to tell the difference between a real and fake website.
    • Ashley M
       
      This is a great definition of what Digital Literact is.
  • Teachers are beginning to use overhead projectors, clickers, and television more
    • Ashley M
       
      This statement explains how our world is relying more on technology each day.
  •  
    This page shows that things bookmarked digital_literacy through the group automatically go to the students in the project. The teachers (who all use diigo) just tag throughout the year to have things ready to go into the wiki when it is time for the project.
  •  
    This is last years information on digital literacy.
WestR WHSB

Fair Use Teaching Tools | Center for Social Media - 0 views

  •  
    used for teaching fair use to students "these clips allow students to practice explaining why something is fair use" "you could divide the class into groups and have every group discuss the same scenario and then come back together to see if groups agree. Or you could divide up the class and give every group a difference scenario to discuss. The groups could then report back and see if their classmates agree or disagree with them. Finally, you could choose one scenario and divide the class in half. Have one group argue for fair use and one argue against fair use. Whose argument is stronger and what does the class ultimately believe is the right answer? " "Have them give any and all arguments that they think explain why the video is fair use. "
  •  
    "The Center for Social Media has created a set of teaching tools for professors who are interested in teaching their students about fair use. The tools include power points with lecture notes, guidelines for in-class discussions and exercises, assignments and grading rubrics." the center of social media has created a set of teaching tools for teacher to teach their students about fair use.
wildcat wildcat

digiteen2008 - Digital Etiquette - 3 views

  • Good etiquette is shown by having a proper education, manners and a sense of tact.
  • Etiquette mainly appears when someone has guests, meets with other people, or during meals.
  • Etiquette: Key terms Etiquette: rules governing socially acceptable behavior. Propriety: correct or appropriate behavior. Manners: a polite or well bred social behavior or habits Proper: marked by suitability or rightness or appropriateness. Education: the activities of educating or instructing; activities that impart knowledge or skill. Respect: an attitude of admiration or esteem. Civilized: having a high state of culture and development both social and technological. Social: living together or enjoying life in communities or organized groups. Tact: the ability to speak without offending others. Polite: showing regard for others in manners, speech, behavior. Impression: mental picture: a clear and telling mental image. Cleanliness: the habit of keeping free of superficial imperfections, diligence in keeping clean. Sophisticated: having or appealing to those having worldly knowledge and refinement. Society: an extended social group having a distinctive cultural and economic organization.
  • ...14 more annotations...
  • Digital Etiquette 1. Here is some tips that you should follow when talking online, texting, or emailing: 2. Say Hello before you start talking. It’s polite and it can make somebody happy knowing that somebody is nice enough to say hello. 3. Try to avoid replying “Sure”. A person will go crazy trying to figure out “Sure” what? Also, depending on who you are talking to online, the person may know little of your language and might not understand what you are saying, so be patient. 4. Avoid trailing off. If you stop responding to somebody all of the sudden they might think you’re ignoring them. If you have to go and do something say “BRB” or “one sec”. It will calm any worries, which the person has, who you are communicating to. 5. Don’t post people’s photos without their permission. Somebody might have a religion where they're not allowed to have they're pictures online. 6. Accept differences. Everybody has different beliefs. Don’t make fun of somebody’s religion or country because people can really get offended about what you say. 7. Talk about things that are appropriate. Chat rooms are for anyone who wants to talk to new people. One inappropriate comment can ruin it for everyone. You should always be aware to whom you are talking to and if they ask you to do anything which you feel uncomfortable about then tell an adult immediately so then the problem won't get out of hands. 8. Say bye before you leave the person whether its in person or online. You could seriously hurt somebody’s feelings if you just stop talking to them. 9. Be careful the way you type something. What you write can sound very different than what you mean. Read your writing before you press send. It could save you from an embarrassing situation. 10. Avoid writing in all capital letters. It looks like you're shouting. Wouldn't you think I was shouting if you saw this, DON'T WRITE IN ALL CAPITAL LETTERS.
  • Access Communication Literacy Student Environment Security and Safety Etiquette Rights and Responsibilities Student Life Outside Commerce Law Health and Wellness Class Actions American School of Madrid Spain Anand Vidya Vihar India Aspengrove School Canada Badshah Faisal Islami Institute Bangladesh La Grange USA Pahartali Girls High School Bangladesh Rani Bilashmoni Govt. Boys High School Bangladesh Troy Middle School USA Qatar Academy Qatar Wedderburn College Australia Westwood Schools USA Information Social & Ethical Issues Rubrics Teachers Template sj32 · My Wikis · · My Account · Help · Sign Out · Digital Etiquette page Details and TagsPrint PDF Backlinks Source Delete Rename Redirect Permissions Lock discussion (39) history notify me Details last edit Friday, 12:46 pm by kcaise - 124 revisions Tags none Type a tag name. Press comma or enter to add another. Cancel Table of ContentsDigital Etiquette 1. Overview/Description of the various aspects of the topic. Elementary Aged Students Middle/ High School Aged Students Email Etiquette: BE A SPORT, AND KEEP IT SHORT: NON MIND READERS FRIENDLY, PLEASE!: graTipos and.grammar! can caus cauz ishueezz? (typos and grammar... can cause issues!) BUISNESS FOR BUSYNESS!!! BE PLASTIC-ON-THE-SCREEN-CLEAR!!! A
  • Digital Etiquette or netiquette is a basic set of rules you should follow to make the internet a better place for other people and yourself.
  • When you instant message, chat, or email someone over the internet, that person can't tell if your just joking because they can't see your face. Don't say stuff over the internet that can be taken the wrong way or can hurt someones feelings
  • The internet takes over some peoples lives and people can get brain washed so easily when on the computer. Hacking other computers, using bad language, downloading illegally, and plagiarism are examples of having bad or no etiquette when it comes to the internet.
  • Etiquette is a set of rules dealing with exterior form
  • Middle/ High School Aged Students Teenagers these days are only on the internet to chat with their friends they know, or to look at cool videos or pictures.Myspace and Facebook are easy ways for teenagers to get access to the internet. These two websites have caused a lot of controversies over the internet because some teenagers will put bad pictures on the internet of themselves or other people. Every once in a while fights will occur between people who are trying to make each other look bad. It gives them a bad reputation and it ruins friendships all over the world. I just think that if teenagers would act mature then a lot of these things would not happen.
  • Online plagiarism is where internet users copy or use part of your or someone else's work. It is definitely not acceptable and is becoming a major issue. People need to have the right to place information on the internet knowing that it will not be copied for other people's work. Plagiarism is illegal but people still don't get the message. Plagiarism really could start major problems like people not writing the truth on the internet or making up information just to teach people a lesson. If someone is going to copy other people's work really they are better off handing the work in late or not at all. Using people's ideas is okay if you give them recognition or asked them. Plagiarism is equal to lying, if not worse. People are being generous by putting their knowledge on the internet to help people not to do it for people. Have courtesy and respect- don't copy peoples work use it as a guide and acknowledge them for their work and help. Plagerism- it's illegal so do the right thing.
  • ownloading illegally is one of the things not do in digital etiquette. Using file sharing programs such as KaZaA, Bit Torrent, iMesh, and Lime Wire to share or obtain copyrighted music, movies, games, and other software without the permission of the copyright holder is illegal. Stealing music has lots of effects once done. Some of the effects are listed below. Stealing music is against the law. Stealing music betrays the songwriters and recording artists who create it. Stealing music stifles the careers of new artists and up-and-coming bands. Stealing music threatens the livelihood of the thousands of working people—from recording engineers to Christian music retailers and their staffs —who are employed in this ministry.
  • Downloading Illegally
  • Some ways on avoiding stealing music are: Read user agreements carefully. Check the Web sites of the musicians, record companies, or movie studios to see if they allow distribution of their materials on the Internet. When purchasing music, movies, games, software, or other materials, read the license carefully to learn if you have permission to convert materials to other formats for personal use. Don't share or distribute materials unless you have permission. Of course, there are consequences to this kind of action. For one you can be fined of at least $500 dollars. The online infringement of copyrighted music can be punished by up to 3 years in prison and $250,000 in fines," the website said. "Repeat offenders can be imprisoned up to 6 years. Individuals also may be held civilly liable, regardless of whether the activity is for profit, for actual damages or lost profits, or for statutory damages up to $150,000 per infringed copyright. " To avoid these kinds of consequences you must avoid downloading illegally. I suggest that you follow the ways on avoiding these sort of consequences.
  • Some people have had both positively and negatively affected by internet etiquette. An example of negative etiquette on the internet is like if a person copies somebody's work without their permission and then the person who got copied goes and deletes that person's work
  • Don't type in all caps it looks like you're shouting which can offend some people which are on the other end of the computer because when you are talking to a person in face its easier to get your point across than talking online. Also if you try to do humor on the computer someone might not know that it is humor, and might take it as personal and you can get in trouble in all sorts of ways. Another thing is don't send rude messages or offensive e-mails to one another. It bad manners and it can get way out of hand in no time. Although you might be a pro at cyberspace be nice to the new comers. For a new comer on computers it is like learning a different language for them. Computers take a lot of practice and it is also called for mistakes. So be nice to everyone you meet and also try to help them if you can.
  • Another example is if you do something very funny and one of your friends got you on video tape and he goes and posts it on YouTube
  •  
    What etiquettet is
  •  
    "Digital Etiquette or netiquette is a basic set of rules you should follow to make the internet a better place for other people and yourself"
Garrett E

Why Cell-Phone Health Concerns Persist - 0 views

  • Arjen Witzel Feb 18, 2010 7:07 AM GMT Effects ofexposure to emf radiation/ mobile phone/ wireless and related technology at my body are :Headache Fatigue Stress Sleep disturbances Skin symptoms like prickling, burning sensations, rashes, muscle pains and aches and more.But Doctors can't emplane any of this in Nederland.I lost my lob two times now.And can't start a new one because of my state of health.To keep alive at home i have rebuild my rand house in a cage of Faraday.Outside it 800/2200 uW/m2 from cell-towers and radiated devices from next door.Inside 0,4uW/m2 where i now can sleep properly.Before that impossible to get to sleep.Around me many people have the same problems, and the don't no what is the problem jet!Taking many medicine for nothing just like me in the past.I have nu future any-more. Adam Nov 6, 2009 6:38 PM GMT I have used a number of cell phones over the past 10 years. Its easy for me to say that my eye twitching, localized piercing head aches, tremors, etc are the result of this phone but it can not be proven. I do not have a home phone, I use my cell as my primary phone end never really thought that it may be the cause of head/brain issued until recently. My question... are the blue tooth devices really any better? do they not still pick up and transmit the same waves as the hand held device I have spent so much time holding next to my brain? i wish a few real studies not conducted or funded by the phone companies would surface... we need the help. Virginia Farver Sep 22, 2009 9:45 PM GMT I'm writing in behalf of my Son, Richard Blaine Farver,(Rich). Rich, died of glioblastoma multiforme brain cancer Oct.11,08 at the age of 29. Rich always had his cell phone on his head or in his pocket! Like millions of other kids he had used it for the last several years. His tumor was on the right side of his head, and he was right handed! Rich was also a graduate student at SDSU in San Diego,CA. In March of 09, articles were written about Rich and one other man that died in 2008 from glioblastoma, one died in the 90's from glio, and one is currently battling a malignant brain tumor. The articles are about a particular building and room on SDSU campus. 'Nasatir, room 131.' I found these articles in August 09. I KNOW, cell phone use caused my Son's cancer and the public needs to take this Very seriously! There is a cell tower next to this building, room, also! The, "It won't happen to me," attitude needs to be changed!! Everyone heed my WARNING! It can happen to any one! This has destroyed our lives! Please, I DO NOT want anyone else to endure this, or their families!Sincerely,Virginia Farver
  • been around for over 20 years, and they're now used by more than 3 billion people
  • including cancer
  • ...9 more annotations...
  • "Although the evidence is still controversial, I am convinced that there are sufficient data to warrant issuing an advisory to share some precautionary advice on cell-phone use," wrote Ronald Herberman in a memo to 3,000 faculty and staff in late July.
  • director of the University of Pittsburgh Cancer Institute, who warned school employees to limit their cell-phone use
  • many studies
  • "The overwhelming majority of studies that have been published in scientific journals around the globe show that wireless phones do not pose a health risk," said the Cellular Telecommunications & Internet Assn., the wireless industry's trade group
  • wireless industry, from Nokia (NOK) and Motorola (MOT) to Verizon Wireless and AT&T (T), says there is no cause for concern
  • definitive scientific proof is tough to come by
  • them hard to study
  • mainstream products for only 10 years or so, and it may take much longer than that for adverse effects to show up
  • "The most difficult thing to resolve is whether there is an effect with long-term mobile-phone use," says Rodney Croft, executive director at the Australian Center for Radio Frequency Bioeffects Research.
  •  
    "Mobile phones have been around for over 20 years, used by more than 3 billion people." "can contribute to health problems, including cancer?" director of the University of Pittsburgh Cancer Institute, who warned school employees to limit their cell-phone use based on early unpublished data from scientific studies. "Although the evidence is still controversial, I am convinced that there are sufficient data to warrant issuing an advisory to share some precautionary advice on cell-phone use," wrote Ronald Herberman in a memo to 3,000 faculty and staff in late July. The wireless industry, from Nokia (NOK) and Motorola (MOT) to Verizon Wireless and AT&T (T), says there is no cause for concern. "The overwhelming majority of studies that have been published in scientific journals around the globe show that wireless phones do not pose a health risk," said the Cellular Telecommunications & Internet Assn., the wireless industry's trade group, in a statement following Herberman's memo. Questions that there are adverse effects with long-term mobile phone use.
Haley M

The Campus Guide to Copyright Compliance - 0 views

  • Copyright Basics: Fair Use Determining Fair Use Exceptions for Libraries and Archives Exceptions for the use of Materials in an Educational Setting   Fair use is a concept embedded in U.S. law that recognizes that certain uses of copyright-protected works do not require permission from the copyright holder or its agent. These include instances of minimal use that do not interfere with the copyright holder's exclusive rights to reproduce and reuse the work. Fair use is not an exception to copyright compliance; it is more of a "legal defense." That is, if you copy and share a copyright-protected work and the copyright holder claims copyright infringement, you may be able to assert a defense of fair use which you would then have to prove. Fair use is primarily intended to allow the use of copyright-protected works for commentary, parody, news reporting, research and education. However, not all uses in an academic context are automatically considered fair use. The Copyright Act does not spell out the specific types of content reproduction that qualify as fair use. It offers an outline as to how to analyze whether fair use may apply in a particular situation. As a result, the Copyright Act leaves it up to the individual to determine, based upon the factors in Section 107 of the Act, whether fair use applies in each particular circumstance. To avoid a potential legal challenge from the copyright holder, many institutions follow a policy of "when in doubt, obtain permission."
  •  
    digiteen12--2.flatclassroomproject.org
Maggie B

Nine Elements - 3 views

  • one has the opportunity to communicate and collaborate with anyone from anywhere and anytime. Unfortunately, many users have not been taught how to make appropriate decisions when faced with so many different digital communicatio
  • communicate with other people. In the 19th century, forms of communication were limited. In the 21st
  • Digital Citizenship
  • ...23 more annotations...
  • citizenship can be defined a
  • to create rules and policy, we must teach everyone to become responsible digital ci
  • l uncomf
  • ic standards of conduct or procedure. Technology users often see this area as one o
  • oral goods and services are surfacing such as pornography and gambling. Users need to learn about how to be effective consumers in a new digital economy. 
  • t economy is being done electronically. Legitimate and legal exchanges are occurring, but the buyer or seller need
  • n electronic society. All people should have fair access to technology no matter who they are.  Places or organizations with limited connectivity need to be addressed as well.  To become productive citizens, we need to be committed
  • norms of appropriate, responsible behavior with regard to technology use. 
  • 1.   Digital Access:   full electronic participation in society. Technology users need to be aware of and support electronic access for all to create a foundation for Digital Citizenship.
  • s the
  • Digital
  • 2.   Digital Commerce:   electronic buying and selling of goods. Technology users need to understand that a large share of marke
  • 3.   Digital Communication:   electronic exchange of information.
  • One of the significant changes within the digital revolution is a person’s ability to
  • offer a wide variety of choices (e.g., e-mail, cellular phones, instant messaging).  The expanding digital communication options have changed everything because people are able to keep in constant communication with anyone else.
  • n options.
  • 4.   Digital Literacy:   process of teaching and learning about technology and the use of technology. While schools have made great progress in the area of technology infusion, much remains to be done. A renewed focus must be made on what technologies must be taught as well as how it should be used.
  • 5. Digital Etiquette:   electron
  • 9.   Digital Security (self-protection):   electronic precautions to guarantee safety.
  • We need to have virus protection, backups of data, and surge control of our equipment. As responsible citizens, we must protect our information from outside forces that might cause disruption or harm.
  • Digital Law:   electronic responsibility for actions and deeds
  • Digital Rights & Responsibilities:   those freedoms extended to everyone in a digital world
  • Digital Health & Wellness:   physical and psychological well-being in a digital technology world.
  •  
    Most people make the wrong health decisions. When they make these decisions, they mess up their whole life. Online health is the same. If you mess up there, you mess up your life.
  • ...2 more comments...
  •  
    "Nine Themes of Digital Citizenship Digital citizenship can be defined as the norms of appropriate, responsible behavior with regard to technology use. 1. Digital Etiquette: electronic standards of conduct or procedure. Technology users often see this area as one of the most pressing problems when dealing with Digital Citizenship. We recognize inappropriate behavior when we see it, but before people use technology they do not learn digital etiquette (i.e., appropriate conduct). Many people feel uncomfortable talking to others about their digital etiquette. Often rules and regulations are created or the technology is simply banned to stop inappropriate use. It is not enough to create rules and policy, we must teach everyone to become responsible digital citizens in this new society. 2. Digital Communication: electronic exchange of information. One of the significant changes within the digital revolution is a person's ability to communicate with other people. In the 19th century, forms of communication were limited. In the 21st century, communication options have exploded to offer a wide variety of choices (e.g., e-mail, cellular phones, instant messaging). The expanding digital communication options have changed everything because people are able to keep in constant communication with anyone else. Now everyone has the opportunity to communicate and collaborate with anyone from anywhere and anytime. Unfortunately, many users have not been taught how to make appropriate decisions when faced with so many different digital communication options. 3. Digital Literacy: process of teaching and learning about technology and the use of technology. While schools have made great progress in the area of technology infusion, much remains to be done. A renewed focus must be made on what technologies must be taught as well as how it should be used. New technologies are finding their way into the work place that are not being used in schools (e.g., videoconfer
  •  
    9 elements to digital citizenship
  •  
    In order for students to be achieve digital citizenship, we must know how to communicate properly.
  •  
    Nine Themes of Digital Citizenship Digital citizenship can be defined as the norms of appropriate, responsible behavior with regard to technology use. 1. Digital Access: full electronic participation in society. Technology users need to be aware of and support electronic access for all to create a foundation for Digital Citizenship.
Kelby W

Ethical Issues of Internet Privacy - 0 views

  •  
    Internet privacy is a major concern of today. Privacy over the internet has some issues, which need to be dealt with.  "Using the Internet often comprises the use of social networking sites, email facilities and the browse of various other websites. Internet privacy comes on the scene when it comes to website users giving out their personal details on the Internet. For certain websites, which facilitate online shopping, the users are made to input their credit card numbers. In case of emailing sites, there are issues about whether third parties should be allowed to store or read emails without informed consent. Whether or not, the third parties should be permitted to track the visitors on a website, is another major privacy concern. The other important Internet privacy issue is whether the sites that gather personally identifiable information from the users should store or share it. Internet privacy can be considered as a subset of computer privacy. Computer privacy consists of the data privacy relating to the avoidance of the improper disclosure of the personally identifiable information collected and stored by websites. The effective sharing of data while protecting the private information is the real challenge. One school of thought denies the existence of Internet privacy while the other advocates the necessity of the Internet privacy. Complete anonymity is not the intent of Internet privacy. It rather intends to achieve a controlled disclosure of one's personal information. Internet is a network of networks and when a person uses the Internet, he/she connects to it and is identified by an address. In technical terms this address is known as an IP address. For security reasons, a website may wish to track these addresses of its users. Websites may collect the non-personally identifiable information of their users. Such information is the one, which in no way can be used to uniquely identify a person. The disclosure of these forms of information is acceptable
Miller S.

How Adult Learners are Using the Internet - 0 views

  • Adult literacy/basic education/ESOL students are beginning to use the Internet. An increasing number are very interested in using it for a wide range of purposes: for learning (e.g. to improve reading and writing skills, or take a course;) to access a wide variety of information (e.g. information about the weather, health, travel, other cultures, American news, and -- in the case of ESOL students -- news from their native countries;) for classes at school; for shopping; to communicate with friends, family members, other students, or key pals; for entertainment; for virtual travel; and for the sense of control and power one can feel when using a computer and the Internet. Adult students appear to experience many of the same kinds of difficulties in using the Internet that their teachers do: problems getting access and getting online; having the system crash for a variety of reasons; difficulty figuring out how to navigate online; problems with online and hardcopy instructions; finding out-of-date information at sites; and reading on-screen. Some students also cited problems with their keyboard skills.
    • Miller S.
       
      Adults using the internet
  •  
    Adult literacy/basic education/ESOL students are beginning to use the Internet. An increasing number are very interested in using it for a wide range of purposes: for learning (e.g. to improve reading and writing skills, or take a course;) to access a wide variety of information (e.g. information about the weather, health, travel, other cultures, American news, and -- in the case of ESOL students -- news from their native countries;) for classes at school; for shopping; to communicate with friends, family members, other students, or key pals; for entertainment; for virtual travel; and for the sense of control and power one can feel when using a computer and the Internet. Adult students appear to experience many of the same kinds of difficulties in using the Internet that their teachers do: problems getting access and getting online; having the system crash for a variety of reasons; difficulty figuring out how to navigate online; problems with online and hardcopy instructions; finding out-of-date information at sites; and reading on-screen. Some students also cited problems with their keyboard skills.
Callie S

10 Ways To Stay Safe Online... - 0 views

  • 10 Ways To Stay Safe Online 1. Be a responsible cyber citizen. If you use the Internet, you're a citizen of a global community-a cyber citizen. Just like being a citizen of your local community, being a cyber citizen has responsibilities. Use the Internet to share knowledge that makes people's lives better. Keep safe, use good manners and respect the laws. 2. Use anti-virus software. A computer virus is a program that can invade your computer and damage or destroy information. Anti-virus software is designed to protect you and your computer against known viruses. But with new viruses emerging daily, anti-virus programs need to be updated regularly. Check with the web site of your anti-virus software company to see some sample descriptions of viruses and to get regular updates for your software. Stop viruses in their tracks! 3. Do not open email from unknown sources. Delete email from unknown sources. Watch out for files attached to e-mails, particularly those with an "exe" extension-even if people you know sent them to you. Some files transport and distribute viruses and other programs that can permanently destroy files and damage computers and Web sites. Do not forward e-mail if you are not completely sure that any attached files are safe. 4. Use hard-to-guess passwords and keep them private. Do not write passwords down on small pieces of paper taped to your computer. You would be surprised how many people are sloppy about keeping their passwords private. Passwords that are easy to-guess are a bad choice. In other words, if your name is "Dan" do not make your password "Dan." Change your passwords regularly and don't give your passwords to anyone! Tell your family that combinations of letters, numbers and symbols are harder to crack than just words. 5. Protect computers with firewalls. Install firewalls for your family-it is not difficult. A firewall helps prevent hackers from breaking into your computer or the computers that belong to your family. Firewalls help prevent thieves from stealing and using private information including your phone number and credit card numbers, which may be stored on a family computer. 6. Do not share access to your computers with strangers. Learn about file sharing risks. Your computer operating system may allow other computers on a network, including the Internet, to access the hard-drive of your computer in order to "share files". This ability to share files can be used to infect your computer with a virus or look at the files on your computer if you do not pay close attention. Check your operating system and other program help files to learn how to disable file sharing. Do not share access to your computer with strangers! 7. Disconnect from the Internet when not in use. The Internet is a two-way road. You get information and also send information. Turning off the Internet makes sure that someone else on the Internet can't enter your computer and cause harm. Disconnecting your computer from the Internet when you are not online lessens the chance that someone will be able to access your computer. 8. Back-up your computer regularly. Help your family back up all household computers onto external media such as CD's or diskettes. 9. Regularly download security protection update "patches". Security flaws are regularly found in operating systems and application software. Companies that make software release quick fixes called "patches" that you should install to correct the latest software flaw. It is a good idea to check for security updates on the publisher's Web site for all the software you own. 10. Help your family to check computer security on a regular basis. Evaluate computer security at least twice a year. To help remember, do it when you change the clocks for daylight-savings time! Check for all of the items listed previously.
  •  
    Safe ways online and how to keep your privacy.
  •  
    website uses ten safety rules to stay safe online. 1. Be a responsible cyber citizen. 2. Use anti-virus software. 3. Do not open email from unknown sources4. Use hard-to-guess passwords and keep them private.5. Protect computers with firewalls.6. Do not share access to your computers with strangers. Learn about file sharing risks.7. Disconnect from the Internet when not in use.8. Back-up your computer regularly.9. Regularly download security protection update "patches". 10. Help your family to check computer security on a regular basis.
  •  
    When online you should follow these tips to stay safe.
Callie S

11 Ways to Stay Safe Online & Protect Your Privacy - FindLaw.com How-To - FindLaw Insider - 0 views

  • 11 Ways to Stay Safe Online & Protect Your Privacy By Nerissa Sardi on September 1, 2009 2:25 PM | No TrackBacks Nearly everyone is using the internet these days to find information or connect with others. But surfing the web can still sometimes feel like the Wild West. Despite technological advances to help reduce the risk of identity theft, becoming the victim of an internet scam or having your privacy invaded is a persistent threat. And, as a number of recent incidents involving social networking websites have shown us, it can even be fatal Keeping your guard up is essential to avoid trouble on the internet. Here are eleven tips from FindLaw.com to help you stay safe online: 1. Be careful who you give your information Avoid giving out personal information such as your name, address, telephone number or other personal information on websites until read and understand their privacy policy. For example, be on guard for online promotions or contests in which you may be asked to provide details about yourself. This information could be used to market to you in the future. Never give out your Social Security number or passwords online, unless you are certain the site is secure. 2. Know you're being watched Be careful of the e-mails you send and the websites you visit while at work. In most U.S. states, employees are exempt from protection by employers who may be monitoring e-mails and internet use while on the job. 3. Don't reply to spamEver get one of those strange, unexpected e-mails for real estate, weight loss, work-at-home or investment opportunities? Your best bet is to delete those e-mails without opening them. Never reply to these e-mails, even to request they remove your name from their lists. Replying will alert the sender that your e-mail is a "live" e-mail attached to an actual person.  4. Use secured websites Before you purchase a product or service online with a credit card, make sure the connection is secure or encrypted. Look for a small lock icon on the website, or look at the URL address line; a secure connection will begin with https:// ("s" for secured) instead of http:// 5. Beware of public wireless accessDon't send personal or confidential information when using public wireless connections in cafes and other public places. Fellow wireless users could potentially monitor what you are doing only a few feet away. 6. Think before you post Avoid revealing personal information or photos on websites such as Facebook, MySpace or SecondLife. Personal or embarrassing information and images can haunt you in years to come like when you are applying for college or a new job. If it's on the internet, it's available for a potential employer, your school, a future or current spouse, your mother or grandmother to find it. 7. Don't trust your friends A number of recent incidents involving "sexting" demonstrate, sending photos of yourself in the nude or in compromising positions could not only be extremely embarrassing when a partner or ex-partner starts to share those photos with his or her friends, but it also could be illegal. 8. Beware of classified listing meet-upsWhen using websites such as Craigslist or Freelist to buy or exchange goods locally, always bring someone you trust with you to meet the seller/buyer. Be cautious about letting strangers into your home or meeting in unsafe places 9. Watch your cookies Cookies are tidbits of information that websites store on your computer. Some cookies are useful, such as those that store information about you so you don't have to retype info every time you go to that site. Other cookies are used to track your motions through a website. Some companies keep this data for their own usages - however, some sell your information to other marketers. You can monitor and edit the cookies on your computer through your browser. 10. Use anti-spyware Spyware is sneaky software that rides its way onto computers during the download of screensavers, games, music and other applications. Spyware sends information about what you're doing on the internet to a third-party, usually to target you with pop-up ads. Anti-spyware will help block this threat. 11. Monitor your kids' internet useMove computers out of the bedroom and into family space where parents and others can check on your child's internet use by simply walking by. Set specific times that your child may surf the web, and set rules about social media websites, such as Facebook, My Space and Twitter.
  •  
    If you follow these 11 rules you will be safer on line and your identity will be more protected.
William B

Internet Addiction & Health Effects | LIVESTRONG.COM - 0 views

  • Anna Cocke graduated from CUNY with a Master of Arts in Journalism, specializing in health and medicine reporting. She has helped produce segments for the Association of Health Care Journalists on health care reform and reported on diabetes in the South Bronx. She has been writing professionally for more than seven years. Photo Credit computer image by blaine stiger from Fotolia.com The Internet has become an integral part of many people's work and personal lives. The number of people online daily has nearly doubled over the past decade, according to research conducted by the Pew Internet and American Life Project. While internet addiction as a specific disorder was being debated for inclusion in the American Psychiatric Association's Diagnostic and Statistical Manual of Mental Disorders as of 2010, treatment centers already exist throughout the U.S. and abroad, including China, Taiwan and Korea. Physical Effects Internet overuse can lead to sedentary lifestyles, weight gain and a decline in physical fitness. Other symptoms can include carpal tunnel syndrome, dry eyes, migraine headaches, a decline in personal hygiene and back aches, according to Maressa Hecht, founder of Computer Addiction Services and a member of the Harvard Medical School. if(typeof disable_adsense_2 === "undefined") { ad_order_2 = (typeof ad_order_2 === "undefined") ? "2" : ad_order_2; ad_client = "ca-livestrong_html"; num_ads = "1"; type = "text"; channels = "art_sub_top_Addiction_Recovery,article_top_diseases,article_top"; class_name = "adsense_afc"; print_google_ad(ad_order_2, num_ads, type, channels, ad_client , class_name ); } Sponsored LinksHow to Stay Asleep Obey this one weird trick to stay asleep all night long. Learn more. www.PeakLife.com/TrySomnapure Depression Depression has also been linked to Internet overuse by researchers at the Institute of Psychological Sciences in Leeds, UK. Researchers found that study participants who exhibited signs of Internet overuse engaged disproportionately than the normal population in sites devoted to pornography, gaming, social networking and chat rooms. They theorized that Internet addicts' use of these sites as replacements for real-life socializing was resulting in depression. However, there is debate as to whether depression results from, or is a cause, or internet overuse. A study published in the "Archives of Pediatrics and Adolescent Medicine" found depression, as well as ADHD and social phobia, to increase the chances of excessive Internet use in adolescents. Sleep Disturbances Evidence also suggests that internet overuse can contribute to sleep disturbances. Studies of Chinese and American children, published in the "Journal of Sleep" and the "Journal of the American Academy of Pediatrics," found that computer use among adolescents was associated with later bed times, later waking times, less restful sleep and an overall decrease in sleep. The use of computers before bedtime has also raised concerns among sleep experts, including Phyllis Zee, a neuroscience professor at Northwestern University, that the light from screens is affecting circadian rhythms and possibly contributing to insomnia.
  •  
    Addiction can be very harmful to your life. You do not to be addicted to anything. Keep your health up and your body healthy. " Photo Credit computer image by blaine stiger from Fotolia.com The Internet has become an integral part of many people's work and personal lives. The number of people online daily has nearly doubled over the past decade, according to research conducted by the Pew Internet and American Life Project. While internet addiction as a specific disorder was being debated for inclusion in the American Psychiatric Association's Diagnostic and Statistical Manual of Mental Disorders as of 2010, treatment centers already exist throughout the U.S. and abroad, including China, Taiwan and Korea. Physical Effects Internet overuse can lead to sedentary lifestyles, weight gain and a decline in physical fitness. Other symptoms can include carpal tunnel syndrome, dry eyes, migraine headaches, a decline in personal hygiene and back aches, according to Maressa Hecht, founder of Computer Addiction Services and a member of the Harvard Medical School. Sponsored Links How to Stay Asleep Obey this one weird trick to stay asleep all night long. Learn more. www.PeakLife.com/TrySomnapure Depression Depression has also been linked to Internet overuse by researchers at the Institute of Psychological Sciences in Leeds, UK. Researchers found that study participants who exhibited signs of Internet overuse engaged disproportionately than the normal population in sites devoted to pornography, gaming, social networking and chat rooms. They theorized that Internet addicts' use of these sites as replacements for real-life socializing was resulting in depression. However, there is debate as to whether depression results from, or is a cause, or internet overuse. A study published in the "Archives of Pediatrics and Adolescent Medicine" found depression, as well as ADHD and social phobia, to increase the chances of excessive Internet use in adolescents. Sleep Disturbances Evidenc
William B

netaddiction.com - 0 views

  • Dr. Kimberly Young has likened Internet addiction to addictive syndromes similar to impulse-control disorders on the Axis I Scale of the DSM. She also developed the Internet Addiction Diagnostic Questionnaire (IADQ) to diagnose the disorder. Meeting five of the following symptoms were considered necessary to be diagnosed.1. Do you feel preoccupied with the Internet (think about previous online activity or anticipate next online session)?2. Do you feel the need to use the Internet with increasing amounts of time in order to achieve satisfaction?3. Have you repeatedly made unsuccessful efforts to control, cut back, or stop Internet use?4. Do you feel restless, moody, depressed, or irritable when attempting to cut down or stop Internet use? 5. Do you stay online longer than originally intended?6. Have you jeopardized or risked the loss of significant relationship, job, educational or career opportunity because of the Internet?7. Have you lied to family members, therapist, or others to conceal the extent of involvement with the Internet?8. Do you use the Internet as a way of escaping from problems or of relieving a dysphoric mood (e.g., feelings of helplessness, guilt, anxiety, depression)?Other Symptoms Include:• Failed attempts to control behavior• Heightened sense of euphoria while involved in computer and Internet activities• Neglecting friends and family• Neglecting sleep to stay online• Being dishonest with others• Feeling guilty, ashamed, anxious, or depressed as a result of online behavior• Physical changes such as weight gain or loss, backaches, headaches, carpal tunnel syndrome • Withdrawing from other pleasurable activities
  •  
    If you think your not addicted, you need to ask yourself these questions and see. It is not good to be. " Dr. Kimberly Young has likened Internet addiction to addictive syndromes similar to impulse-control disorders on the Axis I Scale of the DSM. She also developed the Internet Addiction Diagnostic Questionnaire (IADQ) to diagnose the disorder. Meeting five of the following symptoms were considered necessary to be diagnosed. 1. Do you feel preoccupied with the Internet (think about previous online activity or anticipate next online session)? 2. Do you feel the need to use the Internet with increasing amounts of time in order to achieve satisfaction? 3. Have you repeatedly made unsuccessful efforts to control, cut back, or stop Internet use? 4. Do you feel restless, moody, depressed, or irritable when attempting to cut down or stop Internet use? 5. Do you stay online longer than originally intended? 6. Have you jeopardized or risked the loss of significant relationship, job, educational or career opportunity because of the Internet? 7. Have you lied to family members, therapist, or others to conceal the extent of involvement with the Internet? 8. Do you use the Internet as a way of escaping from problems or of relieving a dysphoric mood (e.g., feelings of helplessness, guilt, anxiety, depression)? Other Symptoms Include: * Failed attempts to control behavior * Heightened sense of euphoria while involved in computer and Internet activities * Neglecting friends and family * Neglecting sleep to stay online * Being dishonest with others * Feeling guilty, ashamed, anxious, or depressed as a result of online behavior * Physical changes such as weight gain or loss, backaches, headaches, carpal tunnel syndrome * Withdrawing from other pleasurable activities"
Kelby W

Did the Internet Kill Privacy? - CBS News - 0 views

  •  
    IN my opinion, if you didn't want people to see it you shouldn't put it on Facebook.  "The pictures were exactly what you'd expect from a European summer vacation: Cafes in Italy and Spain, the Guinness brewery in Ireland. So 24-year-old Ashley Payne, a public high school English teacher in Georgia, was not prepared for what happened when her principal asked to see her in August 2009. "He just asked me, 'Do you have a Facebook page?'" Payne said. "And you know, I'm confused as to why I am being asked this, but I said, 'Yes.' And he said, 'Do you have any pictures of yourself up there with alcohol?'" In fact, the picture that concerned the principal - showing Payne holding a glass of wine and a mug of beer - was on her Facebook page. There was also a reference to a local trivia contest with a profanity in its title. Payne was told a parent of one of her students called to complain. And then, Payne says, she was given a choice: resign or be suspended. "He told me that I needed to make a decision before I left, or he was going to go ahead and suspend me," she said. She resigned. Attorney Richard Storrs is fighting to get Payne's job back. "It would be like I went to a restaurant and I saw my daughter's teacher sitting there with her husband having a glass of some kind of liquid," Storr said. "You know, is that frowned upon by the school board? Is that illegal? Is that improper? Of course not. It's the same situation in this case." But here's the really troubling part: Payne had used the privacy settings on Facebook. She thought that only her closest friends could see her vacation photos or her use of the "B" word. "I wouldn't use it in a classroom, no," she said. "But Facebook is not the classroom. And it's not open to the students of my classroom. They are not supposed to see it. I have privacy in place so they don't see it." Privacy? What Ashley Payne or anyone of us who uses the Internet has to realize is this: Today our private lives are no longe
Taylor B

Online Classroom: Netiquette - 0 views

  • This refers to your efforts to create a sense of online community. Positive climate building can reduce anxiety about communicating online, and contribute to a positive collegial environment. Climate building can be developed by:  Use of first names by participants.  Responding promptly to messages sent to you.  Use of reinforcement phrases (i.e., "Good idea!" or "Thanks for the suggestions," etc.).  Use of personalizing remarks (i.e., a reference to where you are working -- home, office, terminal, what is happening around you, the weather, etc.). Avoiding hostile or curt comments. No objectionable, sexist, or racist language will be tolerated.  Displaying humour.  Promoting cooperation by offering assistance and support to other participants and by sharing ideas.  Beyond Netiquette: Dos and Don'ts   Demonstrating courtesy online is fundamental. (Absolutely no abusive or libelous comments will be permitted.)  Use only your real first and last name online.  Confidentiality: No one else should be given access to any of the conferences (either viewing onscreen or in print), without the previous consent of all participants and conferees.  Copyright & Plagiarism: Don't use the words or text of others without proper acknowledgement of the source (if this was in some public source), or -- if private (as in a conference) unless you first have the author's permission.  The use of humor can be very tricky; sometimes it is seen as sarcasm or derision rather than as funny. Symbols or parenthetic phrases (e.g., :-) or "ha! ha!") can help to convey emotional tone and help to prevent misunderstandings.
  •  
    "Netiquette," or network etiquette, refers to the evolving rules for considerate behaviour on the networks. These guidelines are often posted at the beginning of an online course, or perhaps in the "cafe" or "student center" where all students mingle. Netiquette and Group Dynamics This refers to your efforts to create a sense of online community. Positive climate building can reduce anxiety about communicating online, and contribute to a positive collegial environment. Climate building can be developed by: * Use of first names by participants. * Responding promptly to messages sent to you. * Use of reinforcement phrases (i.e., "Good idea!" or "Thanks for the suggestions," etc.). * Use of personalizing remarks (i.e., a reference to where you are working -- home, office, terminal, what is happening around you, the weather, etc.). * Avoiding hostile or curt comments. No objectionable, sexist, or racist language will be tolerated. * Displaying humour. * Promoting cooperation by offering assistance and support to other participants and by sharing ideas. Beyond Netiquette: Dos and Don'ts * Demonstrating courtesy online is fundamental. (Absolutely no abusive or libelous comments will be permitted.) * Use only your real first and last name online. * Confidentiality: No one else should be given access to any of the conferences (either viewing onscreen or in print), without the previous consent of all participants and conferees. * Copyright & Plagiarism: Don't use the words or text of others without proper acknowledgement of the source (if this was in some public source), or -- if private (as in a conference) unless you first have the author's permission. * The use of humor can be very tricky; sometimes it is seen as sarcasm or derision rather than as funny. Symbols or parenthetic phrases (e.g., :-) or "ha! ha!") can help to convey emotional tone and help to prevent misunderstandings."
  •  
    This is to help people to create a sense of an online community. We want it to be a positive climate on the internet.
Becca B

Top 10 Internet Etiquette Rules to Survive Online | Webupon - 0 views

  • Make use of emoticons like and which help you to get your message across. At certain times, what you write in emails or messages may be misunderstood (omg i have too much experience in this matter lol) and using emoticons will help the understanding of your message. They also add a bit of color and interest to the message.
  • Get to the point! Do your best to keep your messages brief and to the point. This way, the receiver will get a clear understanding of what you mean to say.
  • Do not forward or create spam or chain letters. People would hate you to the max if you did this. It wastes time and has no point. Chain letters are just sometimes random and no one really gives anyway…
  • ...1 more annotation...
  • Never forget to greet people politely in every message you send. It really makes you seem like a friendly person.
  •  
    "# Never type a group of words or a phrase in upper case. IT MAKES IT LOOK AS THOUGH YOU ARE SHOUTING, doesn't it? Other people will get the feeling that you are being a bit rude. The best idea is to stick to regular sentence case when blogging, emailing, commenting, messaging, etc… # Always speak to others the way you would expect yourself to be spoken to in the physical world. Do not curse, swear, or insult others- just imagine what you'd feel like if you were spoken to like that! # Make use of emoticons like :) and :( which help you to get your message across. At certain times, what you write in emails or messages may be misunderstood (omg i have too much experience in this matter lol) and using emoticons will help the understanding of your message. They also add a bit of color and interest to the message. # Patience is the key on the web these days. If you are upset or angry about something, try and wait a while before writing another message. This way, you can calm down and think carefully about your wording in terms of politeness. Remember, once you hit 'send', your message has gone into cyberspace forever! # Get to the point! Do your best to keep your messages brief and to the point. This way, the receiver will get a clear understanding of what you mean to say. # Be careful with using the "Reply All" option whilst in contact online. Do you really want everyone to get this message or only the person who sent it to you? # If someone bullies you or writes something bad to you, don't insult them back. Why? Cause it just doesn't work! Simply ignoring them or blocking their messages does the trick. If your using a messaging service like AOL, Yahoo, or Gmail (As well as thousands of others) then here's a little way of permanently annoying them. Save a copy of every email that was sent to you which you considered offensive and send directly to the administrators or customer service. This will most likely ban the perpetrator from ever using the ser
Rachel H

ADHD and Internet Addiction - 0 views

  • The Causes of Internet Addiction Although the causes of Internet addiction differ depending on the teen in question, experts at Stone Mountain School, a private boarding school for boys in North Carolina, have observed the following common precursors to Internet addiction: Low self-esteem Poor self-image Lack of achievements Feeling undervalued A feeling of lack of control over one’s life A feeling of being trapped Lack of a structured environment Stress and real-world problems Difficulty making and sustaining relationships Strained home environment Lack of community or friends Difficulty regulating persistent negative emotions Lack of a stimulating learning environment Lack of opportunities for mastery Lack of opportunities for exploration Lack of opportunity to play
  • Although the causes of Internet addiction differ depending on the teen in question, experts at Stone Mountain School, a private boarding school for boys in North Carolina, have observed the following common precursors to Internet addiction: Low self-esteem Poor self-image Lack of achievements Feeling undervalued A feeling of lack of control over one’s life A feeling of being trapped Lack of a structured environment Stress and real-world problems Difficulty making and sustaining relationships Strained home environment Lack of community or friends Difficulty regulating persistent negative emotions Lack of a stimulating learning environment Lack of opportunities for mastery Lack of opportunities for exploration Lack of opportunity to play Warning Signs of Internet Addiction Computers are going to remain a central part of American life, so it is essential for parents to learn ways to monitor their child’s computer use and detect the symptoms of Internet addiction. The experts at Stone Mountain School advise parents to watch for the following signs of Internet addiction: Preoccupation with the Internet Change in eating habits, sleep patterns or school performance Physical ailments such as numbness in the hands, eye strain, weight gain or loss, and headaches, back aches or neck aches Neglecting personal hygiene Missing school or work to surf the Web Refusing to do chores or fulfill other responsibilities because of Internet time Using the Internet longer than allowed or desired An inability to cut back on Internet use Giving up previously enjoyable activities in order to spend more time on the Internet Neglecting friends and family in favor of spending time on the computer Defensiveness or efforts to hide or lie about Internet use Becoming irritable when unable to use the Internet Isolating oneself socially or viewing the Internet as an escape Like other forms of addiction, Internet addicts experience difficulty quitting, tolerance (craving more and more screen time) and withdrawal (irritability, anxiety and boredom) when not using the Internet.
  • Warning Signs of Internet Addiction Computers are going to remain a central part of American life, so it is essential for parents to learn ways to monitor their child’s computer use and detect the symptoms of Internet addiction. The experts at Stone Mountain School advise parents to watch for the following signs of Internet addiction: Preoccupation with the Internet Change in eating habits, sleep patterns or school performance Physical ailments such as numbness in the hands, eye strain, weight gain or loss, and headaches, back aches or neck aches Neglecting personal hygiene Missing school or work to surf the Web Refusing to do chores or fulfill other responsibilities because of Internet time Using the Internet longer than allowed or desired An inability to cut back on Internet use Giving up previously enjoyable activities in order to spend more time on the Internet Neglecting friends and family in favor of spending time on the computer Defensiveness or efforts to hide or lie about Internet use Becoming irritable when unable to use the Internet Isolating oneself socially or viewing the Internet as an escape Like other forms of addiction, Internet addicts experience difficulty quitting, tolerance (craving more and more screen time) and withdrawal (irritability, anxiety and boredom) when not using the Internet.
Callie S

10 Ways Google Recommends You Stay Safe Online | Edudemic - 0 views

  • Passwords are the first line of defense against cyber criminals. It’s important to pick strong passwords that are different for each of your important accounts and to change them regularly. Here are some ideas to help create strong passwords. Use a unique password for all your important accounts. Use unique passwords for your accounts, especially important accounts like email and online banking. You are likely to have dozens of accounts across the web, and you cannot guarantee the security of all of them. Criminals target sites that lack strong security, in order to harvest usernames and passwords that they test against other popular sites. When you use the same password across the web, a cyber criminal can learn the password from a less secure site and then use that password to compromise your important accounts. Use a long password The longer your password is, the harder it is to guess. There are almost one quintillion possible 10-character passwords (that’s 4,000 times as many possibilities as if your password only has eight characters) … and that’s if you only use numbers and letters. Use a password with a mix of letters, numbers, and symbols Using numbers, symbols and mixed-case letters in your password increases the difficulty of guessing or cracking your password. For example, there are more than 6 quadrillion possible variations for an eight-character password with numbers, symbols, and mixed-case letters – 30,000 times more variations than an eight-character password with only lowercase letters. Try using a line from a song, film or play Some passwords are easy to guess or crack: Simple words or phrases like “password” or “letmein,” keyboard patterns such as “qwerty” or “qazwsx,” patterns such as “abcd1234” or personal information like your birthday or street name.So choose a combination of letters, numbers, or symbols to create a unique password that’s unrelated to your personal information.One idea you can try is to choose a line from your favorite song, film or play, like “To be or not to be: That is the question.” Then use numbers, symbols and mixed-case letters to recreate it: “2bon2bT1tq” is a password with quadrillions of variations. The more unusual the phrase you choose the better!Or you could pick a random word or phrase, and insert letters and numbers into the beginning, middle, and end, such as “sPo0kyh@ll0w3En.” Make sure your password recovery options are up-to-date and secure Make sure your recovery email address is up to date so that you can receive emails in case you need to reset your password. Sometimes you can also add a phone number to receive password reset codes via text message. Additionally, many websites (including Google Accounts) will ask you to choose a question to verify your identity if you ever forget your password. If you’re able to create your own question, try to come up with a question that has an answer only you would know. Try to find a way to make your answer unique – you can do this by using some of the tips above – so that even if someone guesses the answer, they won’t know how to enter it properly. Keep your password reminders in a secret place that isn’t easily visible Don’t leave notes with your passwords in plain site, on your computer or desk. If you do decide to save your passwords in a file on your computer, create a unique name for the file so people don’t know what’s inside. Avoid giving the file an obvious name, such as “my passwords.” If you have a difficult time remembering multiple passwords, a trusted password manager may be a good solution. Spend a few minutes checking out the reviews and reputations of these services.
  •  
    To stay safe you need a good password. If you follow these rules when making your password you will have a far less chance of cyber crimes.
1 - 20 of 476 Next › Last »
Showing 20 items per page