Skip to main content

Home/ Digiteen/ Group items tagged access

Rss Feed Group items tagged

Dylon Smith

Digital Etiquette - 0 views

  • Digital Etiquette and CollaborationDigital Citizenship
  • Computers and the InternetYou use computers all the time. Now, most people think that computers are better and easier to use than things like pen and paper. Almost all the time, we also use the Internet when we use the computer. The Internet is a huge network that connects millions of computers.
  • The Nine ElementsThe Nine Elements, added together, make up Digital Citizenship. They are:Digital Access ---For everyone to participate with technologyDigital Commerce ---To buy and sell things onlineDigital Communication ---To exchange information onlineDigital Literacy ---To know how and when to use technologyDigital Etiquette ---To act online how others would expect you to.Digital Law ---The legal rights and restrictions for technologyDigital Rights & Responsibilities ---The rights you have online, and the way you should act when you have them.Digital Health & Wellness ---To know how to stay healthy and well while using technology.Digital Security ---- The things you must do to stay safe online.
  • ...2 more annotations...
  • Digital CitizenshipWe should always use the Internet and technologies like cell phones and computers wisely. Digital Citizenship can be defined as knowing how to behave responsibly and appropriately when using technology.
  • Acronyms and EmotionsAn acronym is a few letters or numbers that represents a word or sentence. There are some more well-known acronyms like:LOL ---Laugh Out LoudTTYL ---Talk To You LaterBRB --- Be Right BackG2G --- Got To “2” Go
Tristan S

Virtual Worlds Review: What is a Virtual World? - 0 views

  • A virtual world is an interactive simulated environment accessed by multiple users through an online interface. Virtual worlds are also called "digital worlds," "simulated worlds" and "MMOG's." There are many different types of virtual worlds, however there are six features all of them have in common:
  • 1. Shared Space:
  • 3. Immediacy:
  • ...4 more annotations...
  • 2. Graphical User Interface:
  • 4. Interactivity:
  • 5. Persistence:
  • 6. Socialization/Community:
stephanie j

Virtual Worlds Review: Virtual Worlds List By Category - 0 views

  • Best for Teens Coke Studios Dubit Habbo Hotel The Manor The Palace Playdo Second Life for Teens The Sims Online Sora City There TowerChat whyrobbierocks.com Yohoho! Puzzle Pirates
  • Free Access! Active Worlds Coke Studios Dreamville Dubit Habbo Hotel Mokitown Moove Muse The Palace Playdo Second Life Sora City There TowerChat Traveler Virtual Ibiza Virtual Magic Kingdom Voodoo Chat whyrobbierocks.com Whyville Worlds.com Yohoho! Puzzle Pirates
  •  
    list of many different virtual worlds
Hayes G.

How to Protect Yourself Online - 0 views

  • Personal firewalls and security software packages (
  • Be Careful What You Download
  • Don't Respond to Emails Requesting Personal Information
  • ...5 more annotations...
  • Log Out Completely. Closing or minimizing your browser
  • The best passwords are ones that are difficult to guess.
  • Using a security token can make it even harder for an identity thief to access your online brokerage account.
    • Hayes G.
       
      ways to protect yourself on the internet
  • Make sure the computer you are using has the latest security patches,
Joseph Edore

Solutions for Digital Safety - Youth and Media - 1 views

  • 1. Communication with your daughter or son is key. Build a trusting relationship through dialogue.
  • 2. Create an account to understand how the site works, but not to stalk your kids. They need room to explore, but if you are familiar with the media and technology that they consume, you can provide valuable guidance and suggestions. Surveillance, while possible, damages a trusting parent/child relationship.
  • 3. Ask your kids how they choose to represent themselves and why. Use MySpace as a resource to start a conversation about contemporary fashion, ideals, and media images.
  • ...2 more annotations...
  • 4. Talk about private/ public issues with your kids. Help them to understand the consequences of making certain information publicly accessible. Get them to think through all of the possible audiences who might come into contact with their online information
  • 5. Talk through what kids should do if they receive unwanted attention online or if they find themselves the victims of cyberbullying. A growing number of sites provide useful information about how to confront such problems, including Net Family News , NetSmartz and SafeTeens.
  •  
    "Because being connected is such an integral part of teens’ lives, some youth may hesitate telling their parents about the harassment they encounter for fear that their online privileges will be taken away. The best way to combat cyber bullying or other forms of harassment is not to reign in or limit a teen’s use of technology, but to make sure adults keep the lines of communication open. In addition to keeping the computer in a public space, parents should also become more aware of what their children are doing online. They should consider the Internet as an opportunity to engage in conversation with their children about their interests, talents, and network of friends. It is important to emphasize with youth that there is a distinct connection between what happens online and in the "real world." Adults should communicate to youth that their actions have implications in a real world setting. Regarding cyber bullying in particular, adults must also relay traditional techniques of combating bullying, among them being to report incidents, keep records, and not to engage the bully. “It’s not new bullying, it’s just a vehicle,” says Nancy Mullin-Rindler, director of the Project on Teasing and Bullying at Wellesley College (Paulson, 2003). In addition, because research has shown that the majority of cyber bullies have been victims of traditional bullying, this approach—-combating the behavior versus limiting the technology—-would ultimately help in preventing both cyber and conventional bullying. Cyber bullying poses a stickier problem for schools that are finding themselves in the middle of First Amendment debates. Despite the fact that whatever happens online (no matter where the location) typically spreads to the school environment, inevitably impacting students’ learning, does a school principal have the right to punish someone for what they say outside of school parameters? Because of this legal quagmire, schools’
Rachel H

Dell - Healthy Internet Habits | Dell - 0 views

  • Talk About It Talk with your kids about the Internet, and encourage them to see it as a shared, open environment in which they have social responsibilities just as they would in any physical environment.With open discussion, you can set expectations about the behavior you expect from them, curb negativity and discourage behaviors such as secrecy, boundary-pushing or thrill-seeking. You can also emphasize that online safety is something you care about and will continue to examine.Keep in mind: Enjoy the Internet along with your children, and discuss the ways in which it brings value into your lives.Stay open to your kids' questions, and encourage them to share their Internet experiences with you without fear of punishment about what they read, see or experience.Discuss how to safely interact online with others, why kids should stay away from certain types of content and individuals, and that Internet rules are there to protect kids. Teach children to trust their instincts, and to come to you if something or someone online makes them feel uncomfortable or threatened. Stay calm and remind them that they are not in trouble for bringing issues to your attention. Praise their discretion.As kids get older, keep family communications about the Internet as open and positive as you can. Talk with your kids about their online friends and activities just as you would talk about other friends and activities.
  • Set Rules for Internet Use Lay out rules for Internet use, setting clear expectations for your kids' online habits. A good set of rules should include things like the amount of time kids are allowed to be online, what types of content are appropriate and who it's okay to chat with as well as proper online conduct and good Internet citizenship.Keep in mind: The most successful rules are those that are created collaboratively. Work with your kids to draw up an online family safety contract that the whole family can agree to and sign. Discuss the rules frequently. Remind them that the rules are in place to protect your family, and that strictly maintaining privacy online can lower the risk of being targeted by online predators. Tell kids that following the rules and keeping communications open will allow them to gain freedoms as they get older. Let them know that you will reevaluate the rules over time. You can reinforce the rules you set by enabling restrictions on your PC. Windows Live Family Safety lets you set parameters that can limit Internet searches, monitor and filter specific websites, receive detailed activity reports of your child’s online activities, and let you be in control of who your child can communicate with in Windows Live Spaces, Messenger, or Hotmail1.
  • Balance Time Online Maintaining a balance between entertainment and other activities in kids' lives can be a serious challenge. The Internet has made it even more difficult, as the lines between entertainment and education are often blurred. Modeling a healthy balance between your online and offline activities is a great way to encourage children to do the same.Keep in mind: Enforce rules about the amount of time your kids may spend online, and the hours they are allowed to go online. Help your kids develop self-control, discipline and accountability regarding Internet use. Use parental controls in Windows 7 to limit PC time. Set up individual user accounts to determine how much computer time children have and what hours of the day they are allowed to use the PC, as well as which programs and games they can access.Encourage and support their participation in other activities — particularly physical pastimes with other children. If your child is reluctant, look for offline activities that tap into the same interests your kids pursue online. Watch for signs of Internet dependency. If Internet use seems excessive or begins to affect your child's school performance, health or relationships, consider professional counseling for Internet addiction.
  • ...2 more annotations...
  • Distinguish Between Fact and Opinion Let's face it: There's a lot of content on the Internet that isn't helpful or reliable. While more online fact checking happens today than previously, the ability of nearly anyone to offer opinions or build Web sites can make the Internet a confusing place for young people.Teach your kids how the Internet works, and encourage critical thinking. Train them to use a variety of online resources and to always check, question and verify what they see online. Ultimately, these skills can help your kids avoid bad situations and individuals — such as online predators — that may seek to mislead or trick Internet users. Keep in mind: Start young. Even preschool students use the Internet to look up information. Teach them early to distinguish fact from opinion, and discuss ways to recognize bias, propaganda and stereotyping.Challenge your kids to evaluate what they see online by asking: What is the purpose of this site? To entertain? To sell? Does it provide the author’s contact information or an "About Us" section? Does a company or an individual person sponsor it? Is it a public conversation? Finally, challenge them to consider whether the Internet is the best place to find the information they need.Discuss racism and other forms of hatred with your kids. Software filters can help block hateful material, but critical thinking and an awareness of history and world events can help children recognize more subtle biases.
  • Keep Personal Facts Private Online privacy is vital to your family's safety. Ensuring that your kids communicate online only with people known to them and your family can help limit their contact with unsavory elements. Still, as kids grow older, they are bound to make new friends online. As your kids grow into middle and high school, the most recent research shows that the greatest threat to their safety is actually from people in their own age group, or slightly older.Keep in mind: Ensure that children keep facts such as their real name, age, gender and location private. Discuss how details in photographs can reveal more information to would-be predators than your child intends.Many kids routinely visit social networks and blogs where they may post pictures, make comments and write personal entries. Insist that your kids keep personal information private and that they think twice before joining location-based peer groups that may give away information on their whereabouts.Ensure that your kids understand the risks involved in making private or personal information public online. Keep an open dialogue about the people they come into contact with online. Discuss and evaluate online relationships as you would any other relationships in your child’s life. In this section, we covered some basic knowledge all parents should keep in mind when their children are online. Impress upon your kids the seriousness of online safety concerns, while making sure to keep the lines of communication open and non-judgmental. In the next section, we’ll look at ways to ensure your family’s privacy online isn’t compromised.
  •  
    healthy habits for online
radhika chatterjee

The Internet - Your Main Entertainment Hub - 0 views

  • However, one aspect you may have over looked is that it is a central hub for entertainment.
  • Access to free entertainment could not be easier and what is better than playing in the convenience of your own home. You do not even have to leave your sofa if you do not wish to, meaning that you are able to set the scene in which you can relax, unwind and simply have fun.
  • Taking advantage of free games means you can keep all your pennies firmly in your pocket. The entertaining free games available on the net tend to be easy and come with a full set of instructions. You can enhance your game playing skill with absolutely no risk of handing over any cash.  This can boast your confidence before you decided to take part in any games that are played for real money.
Brandon P

Kids Rules for Online Safety (for pre-teens) | SafeKids.com - 0 views

  •  I will tell my parents right away if I come across any information that makes me feel uncomfortable.
  • 7.   I will not give out my Internet password to anyone (even my best friends) other than my parents.
  • 3.   I will never agree to get together with someone I “meet” online without first checking with my parents. If my parents agree to the meeting, I will be sure that it is in a public place and bring my mother or father along.
  • ...9 more annotations...
  • 4.   I will never send a person my picture or anything else without first checking with my parents.*  
  • 5.   I will not respond to any messages that are mean or in any way make me feel uncomfortable. It is not my fault if I get a message like that. If I do I will tell my parents right away so that they can contact the service provider.
  • 6.   I will talk with my parents so that we can set up rules for going online. We will decide upon the time of day that I can be online, the length of time I can be online and appropriate areas for me to visit. I will not access other areas or break these rules without their permission.
  • 1.   I will not give out personal information such as my address, telephone number, parents’ work address/telephone number, or the name and location of my school without my parents’ permission.*  
  • 8.   I will check with my parents before downloading or installing software or doing anything that could possibly hurt our computer or jeopardize my family’s privacy*
  • 9.   I will be a good online citizen and not do anything that hurts o
  • ther people or
  • is against the law.
  • 10. I will help my parents understand how to have fun and learn things online and teach them things about the Internet, computers and other technology.
  •  
    safety online
  •  
    "Kids Rules for Online Safety " This website shows kids rules that they should follow for online safety. This rules will help pre-teens learn about online safety
Joseph Edore

FEMA For Kids: Online Safety Rules For Kids - 0 views

  • Online Safety Rules For Kids I will not give out personal information such as my address, telephone number, parent's work address/telephone number, or the name and location of my school without my parents' permission. I will tell my parents right away if I come across any information that makes me feel uncomfortable. I will never agree to get together with someone I "meet" online without first checking with my parents. If my parents agree to the meeting, I will be sure that it is in a public place and bring my mother or father along. I will never send a person my picture or anything else without first checking with my parents. I will not respond to any messages that are mean or in any way makes me feel uncomfortable. It is not my fault if I get a message like that. If I do, I will tell my parents right away so that they can contact the online service. I will talk with my parents so that we can set up rules for going online. We will decide upon the time of the day that I can be online, the length of time I can be online and appropriate areas for me to visit. I will not access other areas or break these rules without their permission.
  •  
    kids safety online
Woody H

The Digital Divide: Where We Are | Edutopia - 0 views

  • The digital divide is most commonly defined as the gap between those individuals and communities that have, and do not have, access to the information technologies that are transforming our lives.
    • Ashley M
       
      This is an excellent definition on what the digital divide is.
  •  
    shows a snapshot of our ideas about the digital divide
Brody C

Safety and Security on the Internet - 0 views

  • Why Should I Worry About Security? The Internet is a global collection of Interconnected Networks that facilitate information exchange and computer connectivity. The Internet is comprised of many different computers, all of which fall into two categories: servers (also known as "hosts") and clients (also known as "guests") -- technically, everything on the Internet can be considered a "host," but for this discussion, we'll use "hosts" and "guests." Guest machines send bursts of computer data called "packets" which are analyzed by the server belonging to the guest's Internet service provider. If the data is located locally (on the ISP's machine), the ISP's server will return the packets. If the information sought is not local (on another machine), the ISP's server hands off the packets to a router, which then sends the packets to the server containing the information. Once the information is located, it is sent back to the guest machine. There are many different types of computers that fill these two categories: mainframes, minicomputers, PCs, Macintosh, Unix and others. Despite the many varieties of computers that combine to form the Internet, every computer connected to the Internet needs to be able to communicate with every other computer -- without this ability, there is no Internet. All of these computers are able to communicate because in a sense they can all speak the same language -- TCP/IP. TCP/IP actually isn't a language; it is in computer terms what is known as a "protocol." A protocol is simply a standard for transmitting and receiving bits of information. As long as all of the interconnected computers follow the same protocol, they can exchange information. Unfortunately, when data is sent from one computer to another on the Internet, every other computer in between has an opportunity to see what's being sent. This poses an obvious security problem.
  • Say you decide to purchase concert tickets on the Web. To do so, you need to fill out an electronic form with your name, address and credit card number. When you submit the form, your information passes from computer to computer on its way to the concert ticket web server. It is possible that someone could be watching the data passing through one of the computers that is in between your computer and the concert ticket server. No one knows how often this happens, but everyone concedes it is technically possible. And its also possible off the web, too -- E-mail can be captured (and read, if not encrypted), as can file transfers via unsecure FTP. If someone wanted to, it wouldn't be too difficult to connect a capture device to someone's phone line (assuming they use a modem to connect to the Internet) and steal an electronic copy of the data exchanged on the Internet. Even if you make your purchase on a secure web site supporting the latest security features, it has been recently shown that secure sites can cause Internet Explorer (and other browsers) to send sensitive information to a non-secure server in plain text format.
  • The point is, there are a lot of security issues related to a network such as the Internet. No FAQ could possibly cover them all. That is why this FAQ concentrates on Internet Explorer. Because there are millions of people who use Microsoft Windows family products, and because those millions have the ability to blend Internet Explorer with these products, the seriousness about security should be of paramount importance to everyone. Remember,  software products are only as secure as the environment in which they operate.
  • ...2 more annotations...
  • What Security Features does Internet Explorer Have? Internet Explorer is a safe browser in many ways. The latest version of IE supports Secure Socket Layer (SSL) 2.0/3.0, Private Communication Technology (PCT) 1.0, CryptoAPI, and VeriSign certificates, and one version employs 128-bit encryption, one of the strongest forms of encryption that's commercially available for use over the Internet. To see if you have the 128-bit version of Internet Explorer, go to the Wells Fargo Bank site and take their browser test. "Secure Socket Layer (SSL) is a Netscape-developed protocol submitted to the W3C working group on security for consideration as a standard security approach for World Wide Web browsers and servers on the Internet. SSL provides a security "handshake" that is used to initiate the TCP/IP connection. This handshake results in the client and server agreeing on the level of security they will use and fulfills any authentication requirements for the connection. Thereafter, SSL's only role is to encrypt and decrypt the byte stream of the application protocol being used (for example, HTTP). This means that all the information in both the HTTP request and the HTTP response are fully encrypted, including the URL the client is requesting, any submitted form contents (such as credit card numbers), any HTTP access authorization information (usernames and passwords), and all the data returned from the server to the client." -- Microsoft's IIS 1.0 Features Tour. It has been reported, however, that SSL has been cracked. Private Communication Technology (PCT) is a Microsoft-developed security protocol available in IE only. According to their Internet draft, "The Private Communication Technology (PCT) protocol is designed to provide privacy between two communicating applications (a client and a server), and to authenticate the server and (optionally) the client. PCT assumes a reliable transport protocol (e.g., TCP) for data transmission and reception. The PCT protocol is application protocol-independent. A "higher level" application protocol (e.g., HTTP, FTP, TELNET, etc.) can layer on top of the PCT protocol transparently. The PCT protocol begins with a handshake phase that negotiates an encryption algorithm and (symmetric) session key as well as authenticating a server to the client (and, optionally, vice versa), based on certified asymmetric public keys. Once transmission of application protocol data begins, all data is encrypted using the session key negotiated during the handshake." IE also supports server and client authentication by using digital certificates to identify users to web servers. In addition, IE supports code signing with Authenticode, which verifies that downloaded code has not been modified. For more information on Authenticode, visit Microsoft's Authenticode page or the excellent Authenticode FAQ page. CryptoAPI 1.0 provides the underlying security services for the Microsoft Internet Security Framework. CryptoAPI allows developers to integrate cryptography into their applications. Microsoft has given a great deal of thought to the issue of security and it products, and Internet Explorer 4.0 is no exception. From "Security Zones" to continued support and refinement of Authenticode, IE4 promises to be one of the safest browsers of all time.  You can read all about the security available in IE 4 at http://www.microsoft.com/ie/ie40/?/ie/ie40/features/ie-security.htm. Also, check out what Microsoft is doing to keep transactions private with IE 4.
  • What are "Cookies?" Cookies are small text files that are sent to web browsers by web servers.  The main purpose of cookie files are to identify users and to present customized information based on personal preferences.  Cookie files typically contain information such as your name (or username), password information, or ad-tracking information.  There is a good body of literature on  the Internet about cookies.  Despite what you may have read or heard, most people, including myself, do not view cookies as any kind of a security threat.  However, because of the way cookies work (e.g., a web server storing a text file on someone's hard drive), Microsoft (and other browser manufacturers) have built options into their browsers that notify users when cookies are being passed to them, and give the user an option to prevent the cookie from being accepted.  I don't think this is a good idea.  By rejecting cookies, your browser may not display the entire page or the site may not function as intended. The reality is that cookies are text files -- they cannot contain viruses or execute applications, they cannot search your hard drive for information or send it to web servers, and most of the information they contain is simple tracking information designed to effect better customer service.
  •  
    safe things to do on the Internet and what to learn that is big
Brody C

Internet Safety - 0 views

  • A basic understanding of how Internet risks occur helps to place any Internet safety advice in context. Once you identify which factors have a greater impact on you and your family, you can adapt recommendations to your specific needs. Take a moment to consider each of the six factors that contribute to the current online environment:Lack of knowledge. Consumers of every age and at every level of technical expertise lack broad online safety education. This lack of knowledge is not limited to young people, but extends to the general population, including computer specialists who may not know any more than others about online predatory behavior.Carelessness. Even when we ‘know better,’ we make mistakes. Usually those mistakes occur when we’re tired, rushed, or don’t have a complete understanding of the risks involved. This is especially true when there is no obvious cause and effect to help us correct our behavior. When you post information that is used a month later to rob your home, you are not likely to recognize a connection between the two events. In fact, the vast majority of victims of online crime will not recognize that an action they or someone else took online made them vulnerable to a criminal act.Unintentional exposure of (or by) others. It may be a teacher, school, parent, child, friend, employer, or after-school program that provides publicly accessible information that exposes you. Perhaps your own computer (or mobile phone, or other connected device) has been compromised with spyware that enables criminals to collect your personal information. Maybe when a friend’s computer or other Internet-enabled device was lost or stolen, your information fell into the wrong hands.Technology Flaws. Online products and services can expose consumers – either because the companies who offer them fail to secure their customers’ data and are hacked, or because a company fails to build in adequate safeguards and safety messaging into their product to protect consumers.Holes in consumer protection standards. We cannot place the full burden of online safety on consumers.
James D

digiteen - Digital Rights and Responsibilities - 0 views

  • Those freedoms extended to everyone in a digital world - electronic responsibility for actions and deeds AUP (inside and outside of school) Use online material ethically (citing sources) Report cyberbullies and threats
  • ocially Rights and Responsibilities has a lot of influence over us, and our daily life. Everything we do in our online lives or even just online we have to think if it is within our rights or whether we have the responsibilty to do something. For many of us we found this so hard to do because our rights and responsibilities online are soo very different to them offline, which is why it is importtant for children to incorporate these ideas into their daily lives and at a young enough age for them to adapt to them quickly.
  • ...1 more annotation...
  • You need to be aware of which sites people can gain access to your profile and without your permission. Some examples are: Facebook, MySpace. Beware of sites where people can change your password just by knowing your user name. An itunes account is a good example of where this is the case. If your not sure, test it out for your self by clicking on "forgotten your password?" and seeing whether the new pass word is accepted. If you become a victim of cyberbullying, make sure you contact people responsible for the site. If you join a forum, make should you read through the rules and regulations for members. This can be especially important if the forum is a special interest forum where you may get asked to leave if you post "off topic" mails. Use the Internet respectfully: don't post embarrassing pictures of your friends onto sites without their permission!
Margaret O.

Tech Talk with Tamika: Google+: The Educational Game Changer - 0 views

  • For the past few years educators have sought a way to utilize social networking to communicate and collaborate with other teachers, parents and students.  From Twitter to Facebook teachers have created streams to alert parents of upcoming assignments, Q&A pages and be available for students long after the school doors have closed
  • Security and privacy issues have run amuck with teachers ‘friending’ students on Facebook.  In fact, teachers have lost their job for placing school administratively deemed inappropriate photos on their wall. My school district has mandated that educators follow certain guidelines for teachers to adhere to when students or their parents attempt to become our social network friend. Some people may call this extreme but I view said guidelines as a form of protection for all involved.
  •  
    Teachers have lost their ability to teach effectively by friending their students online
Margaret O.

If We Can Change The Way We Communicate, We Can Change The Way We Educate | Fox News - 0 views

  • Many American classrooms are almost indistinguishable from those that students' grandparents attended.  Twenty-something students still sit in desks facing the front of the classroom, with textbooks, listening to a generalist teacher.
  • A new perspective is needed.  Americans need to consider the fundamental question:  How can we most effectively teach kids the skills they need? 
  • Traditional schools may be best for some students, while others will thrive in moire high-tech learning centers. 
  • ...3 more annotations...
  • Parents can augment or even replace their children's traditional school experience with programs from companies like K-12.  This service allows parents to enroll children in virtual schools or purchase specific curriculum.  Traditional materials—worksheets, books, and other physical materials—are combined with online resources, including multimedia presentations. 
  • If We Can Change the Way We Communicate, We Can Change the Way We Educate
  • Steve Jobs' passing last week encouraged Americans to consider how technology has transformed our lives.  Fueled by the creative genius of men like Jobs, new technology has emerged allowing us to better keep in touch with friends and family, access entertainment and information, and perform work from home or wherever we happen to be at that moment.  While we've successfully integrated technology into our workplaces and personal lives, we've been comparatively slow to apply technology's power to other areas of life, like education.  That needs to change.
  •  
    This changes parents' perspectives about letting their child use technology.
  •  
    This article is about changing our environment to meet modern needs
  •  
    Riya & Margaret, Why do you think education is so slow to change the traditional education paradigm?
Ashley B.

BBB offers parents tips to keep children safe while online | Wichita Eagle - 1 views

  • * Set privacy options.
  • * Explain to your children that they can't take back what they've written.
  • * Know who is looking at your profile
  • ...8 more annotations...
  • * Don't "friend" everyone
  • Don't let your child's profiles on social websites be available to everyone. Explain to your child why it's important to have the highest security and privacy settings. Parents should monitor their children's use of the computer while they're on the Internet.
  • Children and teens should think about who will be looking at their profile. Many people will be able to see their page, including parents, teachers, coaches, the police and the college or the job they might want to apply for in the next few years. They should post only the information they are comfortable with others seeing about them.
  • Merely deleting a post doesn't mean it's not still available for others to see in cyberspace. It is important for children and teens to know that once you press the "send" or "post" button, there is no going back. Think about keeping some control over the information you post. Consider restricting access to your page to a select group of people — for example, your friends or your family.
  • Unfortunately there are dangerous people who may be creeping
  • * Don't divulge too much information.
  • Now that school has started children and teens are spending more time online doing school work, research, and socializing. As soon as a child starts using the computer and Internet, it's time to talk with them about online behavior, safety and security. Parents need to know what to do to ensure their child is safe online, in texting, blogging, Facebook and visiting other Internet sites.
  • Better Business Bureau
  •  
    This website talks about how parents can make sure their children are safe online.
Brandon P

Google Promotes Online Safety With 'Good to Know' Campaign - Search Engine Watch (#SEW) - 0 views

  • Google Promotes Online Safety With 'Good to Know' Campaign
  • Google is about to launch its first online safety campaign. Teaming with the Citizens Advice Bureau (CAB), Google will promote “safe computer usage” for users: by logging out of computers when they're finished using them, specialized child protection, use of cookies in web browsers, and 'two-factor authorization' which sees the user entering a password and then a unique verification code sent to their mobile device
  • Gillan Guy, the CAB's chief executive, said that “Information is a powerful tool for preventing problems from arising in the first and safety, personal data and identity theft are among the top concerns of people of using internet”.
  • ...1 more annotation...
  • Google & the Citizens Advice Bureau created a few tips to stay safe online: Always make sure to have a strong password. Try to always have a unique password to you that no one else will know. Using a long password will keep it safe. Try to always have a mixture of letters, numbers, and symbols. Some people remember their password with a song or lyrics or a mixture of the two. When you get a suspicious email with personal information on it, go directly to the site: don't click on the link in the email. Unless you're expecting the email, it's probably not from them and is known as a "Phishing attack" that's trying to get your personal info and steal from you. Always look for 'https' in the URL. A website is running through a secure connection when it's through https. This will safeguard your emails, credit card numbers, and all other info from watching eyes. Just as you make sure not to leave your front door open, you need to make sure you're always signing out of your computer. Make sure to always sign out of social media accounts and all other accounts that you may have signed into. Try and only use safe networks that are secure. Internet cafes are nice but not always the safest place for you to be browsing the Internet. With all the apps out there, make sure that you always have the latest app. Make sure you trust all your apps and the sources your apps come from. Always lock and passcode lock your phone. Never store personal details on your phone because anyone could take it and have all your info. Two-step verification is a must if accounts offer it. This will make you or anyone else go through two different steps of verification to access your account – much like Facebook when you login. You have to login and then tell which computer you're logging in from, then it texts you. By doing this it will keep your account safe.
  •  
    On this website, I have highlighted a few sections that I thought were important. In the pink, I highlighted what Google is launching and why. In the yellow, I highlighted a quote someone said. The green highlight shows 7 tips that are very important for not only students, but everyone else to stay safe online.
  •  
    Google gives information on how to be safe online. "Good to Know" campaign.
  •  
    "Google will promote "safe computer usage" for users: by logging out of computers when they're finished using them, specialized child protection, use of cookies in web browsers, and 'two-factor authorization' which sees the user entering a password and then a unique verification code sent to their mobile device."
Blaine I

What effect has the internet had on healthcare? | Technology | The Observer - 0 views

  •  
    The affect on the digital healthcare system. It is on how internet messes with your wellness.
  •  
    Blaine, Is it the internet or the tools used to access the internet as used by humans?
Caitlin Roberts

Be Web Aware - Cyberbullying - 2 views

  • Cyberbullying
  • In school ... you don't want anyone to think of you as a "gossip" or someone who says things about other people. Everyone wants to be "nice." You don't have to be nice if you don't want to online. 13 year old girl, Edmonton
  • There is little doubt that cyberbullying, which can be the equivalent of "social death" for many young people, is traumatic. It differs from traditional, face-to-face bullying in that it is relentless and public and at the same time anonymous. Cyberbullying has turned the usual image of "the bully" on its head; it's no longer only the "tough kids" who may act aggressively – it can just as easily be the shy, quiet types, hidden behind their computers. Added to this is the potential presence of countless, invisible witnesses and/or collaborators to the cyberbullying, which creates a situation where victims are left unsure of who knows, and whom to fear.
  • ...3 more annotations...
  • Technology also extends the reach these young people have, enabling them to harass their targets anywhere and at anytime. While these situations should be reported, it can be difficult for young people to step forward: how do you report an attack that leaves no physical scars and is committed by a nameless attacker? Will the consequences of telling an adult that you are being cyberbullied be worse than the bullying itself? Adults want to help, but many feel ill-equipped to handle bullying in a digital world.
  • On social networking sites, you can now tag images with the names of people who are in the photo. This simple act can lead to cyberbullying, as these photos will appear in any search into this person’s name and it could be that misappropriated profile settings do not protect access to them.
  • Multiplayer online games and virtual worlds can be venues for harassment and cyberbullying when kids are playing or using the chat features to talk to other players. According to a 2008 Pew Internet & American Life Project report, more than half of teens who play games report seeing or hearing “people being mean and overly aggressive while playing”; a quarter of them report that this happens “often.”
  •  
    Students need to know that cyberbullying is dangerous: it can take lives, it can ruin lives, and it is not acceptable behavior for us. We are supposed to be the enlightened generation, so why don't we act like it?
  • ...2 more comments...
  •  
    Cyberbullying is probably one on the worst kinds of bullying. Its a type of bullying that never stops and never goes away. Bullies who are online can cause people to take their own lives. This isnt acceptable behavior for anyone.
  •  
    I agree with Brenna Edwards. It is one of the worst also because at school, only a hand full of people may see it, but online everyone can see it. No one should cyberbully
  •  
    I think that Brenna is right. It is really bad that people bully on the internet.
  •  
    Cyberbullying is probably one of the worst types of bullying because you can't figure out who the bully is to put a stop to it. Cyberbullies don't know how serious this is, people take their own lives because of it.
H McConaghy

Xbox Parental Control | Xbox Family Settings | Xbox Privacy - Xbox.com - 2 views

  • lets you customize and manage your family's access to games, movies and television
  •  
    this article talks about parental controls for xbox.
« First ‹ Previous 81 - 100 of 100
Showing 20 items per page