Skip to main content

Home/ Digiteen/ Group items tagged action

Rss Feed Group items tagged

Vicki Davis

Open Thinking & Digital Pedagogy » Blog Archive » Flickr Perversion - 0 views

  • These photos of these girls were without a doubt being sexualized, and my four-year-old daughter was amongst these images.
  • These photos are legal. The actions of the user who favorited these is also legal (although incredibly disgusting). I did not want photos of my child to appear here. So, this is what I did: 1) Blocked the user. This means my photos would no longer appear in the list. However, if your photos are viewable to the public, this means they can still be viewed, just not favorited. 2) Contacted Flickr: I reported this user, and within a couple of hours, the user was taken down.
  • the subjects were handcuffed, often in sexually provocative poses. Again, my daughter’s photos appeared. I blocked the user, contacted Flickr. Same deal. But obviously, that’s not enough.
  • ...1 more annotation...
  • 1) What must parents know about the realities of the Internet in regards to how we deal with the photos (and identities) of our children? 2) What are the benefits of an open vs. a closed reality? Are the benefits of openness (e.g., in regards to our families) worth the risks? And, what are the credible risks? 3) What precautions should we take, or perhaps, what precautions do you take in the presentation/development of your family’s digital identity? 4) What rights and responsibilities do we have as parents to protect the digital identities of our children? 5) How do we proceed from here? How do we help other parents to understand these important issues?
  •  
    This is why I don't share the photos of my children online in public places. After one pic of a child at school was favorited in this way, I took the pic down and am ridiculously vigilant about checking to see how many photos have been favorited and which ones to see if there is one that some sicko has looked at. This is an article I'm going to share with my digiteen dream team! It is an important one to share!
Rachel H

Video Game Addiction - Internet Gaming Addiction - 0 views

  • eased
  • rnet us
  • e is associated with
  • ...6 more annotations...
  • poor eating habits, lessened physical activity and behavioral issue
  • ew study published in the journal Injury Prevention shows that
  • Internet addiction can also lead teens to cause themselves har
  • through pulling their own hair or hitting, pinching or burning themselves
  • Though self-injurious behavior can be attributed to many different factors, such as depression, stressful life events or family problems, the study found that Internet addiction on its own can lead to teens harming themselves.
  • An Internet addiction is classified the same as other addictions, such as those to drugs, alcohol or gambling. If your teen simply goes on the Internet frequently, it is unlikely you have anything to worry about. But if your teen is exhibiting any of the following signs of an Internet addiction, you may want to take action: Excessive time spent devoted to using the Internet Depression, moodiness or nervousness when not online Fantasizing about or being preoccupied with being online A change in sleeping patterns or habits Sudden weight loss or weight gain Lying about time spent on the Internet or denying use Neglecting family, friends or activities they used to enjoy Using the Internet to avoid problems Internet addicts can also experience physical symptoms such as dry eyes, backaches, migraine headaches and carpal tunnel syndro
Jerilyn J

4 Etiquette Tips in a 3D Virtual World - 0 views

  • A 3D virtual world is incredibly similar to everyday life. These virtual worlds bring people together to interact with one another in a community and society setting. As in any normal normal society, there are certain actions that are simply unacceptable.
  • Be Courteous and Respectful
  • Be a Team Player
  • ...2 more annotations...
  • Never Cheat
  • Never Bully More Inexperienced Players
Susan Davis

Centenary College:  Online Etiquette - 0 views

  • Respect others and their opinions. In online learning students from various backgrounds come together to learn. It is important to respect their feelings and opinions though they may differ from your own.Consider others’ privacy. Ask for permission if you want to forward someone’s email messages to third parties. Keep in mind that all private email mail is considered copyrighted by the original author. Pick the right tone. Since we depend on the written word in online learning, it is especially important to choose the right words to get your meaning across. For example, sarcasm is harder to detect when you read the words rather than hearing them.Avoid inappropriate material. Distribution of pornographic material will result in disciplinary action.Be forgiving. If someone states something that you find offensive, mention this directly to the instructor. Remember that the person contributing to the discussion might be new to this form of communication. What you find offensive may quite possibly have been unintended and can best be cleared up by the instructor.Think before you hit the send button. Think carefully about the content of your message before contributing it. Once sent to the group there is no taking it back. Grammar and spelling errors reflect on you and your audience might not be able to decode misspelled words or poorly constructed sentences.Brevity is best. Be as concise as possible when contributing to a discussion. Your points might me missed if hidden in a flood of text.Stick to the point. Contributions to a discussion should stick to the subject. Don’t waste others' time by going off on irrelevant tangents.Do not type in all caps. Typing in caps is considered shouting or screaming online. Various studies on the topic reflect that it is more difficult and takes longer to read text that is typed in all caps. Frivolous email. Don’t forward jokes, "chain letter's" or unimportant email to other students without their permission. Not only does it fill up their mailboxes but may offend people who do not share the same sense of humor or who are tired of these types of email.
Steve Madsen

Winners of Trend Micro's 2011 "What's Your Story?" Internet Safety Video Contest Challe... - 1 views

  •  
    Trend Micro Inc. today announced the winners of the company's second annual "What's Your Story?" international video contest that empowers youth to be leaders in educating others about being safe online.
  •  
    Various winners for online safety via Trend Micro. These may be good examples for Action Projects?
LucasA_mca MCA

Digital Law - 0 views

  •  
    . It deals with the ethics of the technology and the unethical uses it for the crimes and damage it does to society. These laws apply to everyone including kids who use it in school and try downloading things or stealing them also.
Brody C

Internet Safety - 0 views

  • A basic understanding of how Internet risks occur helps to place any Internet safety advice in context. Once you identify which factors have a greater impact on you and your family, you can adapt recommendations to your specific needs. Take a moment to consider each of the six factors that contribute to the current online environment:Lack of knowledge. Consumers of every age and at every level of technical expertise lack broad online safety education. This lack of knowledge is not limited to young people, but extends to the general population, including computer specialists who may not know any more than others about online predatory behavior.Carelessness. Even when we ‘know better,’ we make mistakes. Usually those mistakes occur when we’re tired, rushed, or don’t have a complete understanding of the risks involved. This is especially true when there is no obvious cause and effect to help us correct our behavior. When you post information that is used a month later to rob your home, you are not likely to recognize a connection between the two events. In fact, the vast majority of victims of online crime will not recognize that an action they or someone else took online made them vulnerable to a criminal act.Unintentional exposure of (or by) others. It may be a teacher, school, parent, child, friend, employer, or after-school program that provides publicly accessible information that exposes you. Perhaps your own computer (or mobile phone, or other connected device) has been compromised with spyware that enables criminals to collect your personal information. Maybe when a friend’s computer or other Internet-enabled device was lost or stolen, your information fell into the wrong hands.Technology Flaws. Online products and services can expose consumers – either because the companies who offer them fail to secure their customers’ data and are hacked, or because a company fails to build in adequate safeguards and safety messaging into their product to protect consumers.Holes in consumer protection standards. We cannot place the full burden of online safety on consumers.
James D

digiteen - Digital Rights and Responsibilities - 0 views

  • Those freedoms extended to everyone in a digital world - electronic responsibility for actions and deeds AUP (inside and outside of school) Use online material ethically (citing sources) Report cyberbullies and threats
  • ocially Rights and Responsibilities has a lot of influence over us, and our daily life. Everything we do in our online lives or even just online we have to think if it is within our rights or whether we have the responsibilty to do something. For many of us we found this so hard to do because our rights and responsibilities online are soo very different to them offline, which is why it is importtant for children to incorporate these ideas into their daily lives and at a young enough age for them to adapt to them quickly.
  • ...1 more annotation...
  • You need to be aware of which sites people can gain access to your profile and without your permission. Some examples are: Facebook, MySpace. Beware of sites where people can change your password just by knowing your user name. An itunes account is a good example of where this is the case. If your not sure, test it out for your self by clicking on "forgotten your password?" and seeing whether the new pass word is accepted. If you become a victim of cyberbullying, make sure you contact people responsible for the site. If you join a forum, make should you read through the rules and regulations for members. This can be especially important if the forum is a special interest forum where you may get asked to leave if you post "off topic" mails. Use the Internet respectfully: don't post embarrassing pictures of your friends onto sites without their permission!
Liz D

UK online safety expert proposes Pet Society feature as dangerous to children - 2 views

  • Conway, a self-touted "online safety expert,"
  • stranger danger"
  • By being in the Cafe, you're bound to meet strangers. Even though all you can do once you get to another pet's home is some pre-set actions (e.g. hug, kiss, dance, laugh, and punch), there's also the option to visit the real Facebook profile of a someone you might not know at all. Conway demonstrated this by creating an avatar named "BunnyPig" to demonstrate to a group of foster care and social workers.
  • ...3 more annotations...
  • Because Facebook games require players to have lots of friends to earn virtual money and goods, Conway concludes that kids will be tempted to friend strangers
  • And in turn, he estimates that malevolent strangers can scope out kids who play the game. This "Go to profile" option is clearly a valid concern and does exist in the game.
  • kids under 13 years-old could still lie to Facebook about their age just to have a Facebook account.
  •  
    This article is by Charles Conway. He says that children must friend a lot of people to get coins or money for Pet Society , a fast growing Facebook game. This means children under the age of 13 are becoming interested in this website. They might even lie to create an account. Adding people they do not know will be a bad habit for children at this youngof age.
Margaret s

Gale Opposing Viewpoints In Context - Document - 0 views

  •  
    this story shows how computer literacy can help
Talyor b

Gale Student Resources In Context - Document - 0 views

  •  
    This is a digital citizenship. This is part of the essential questions.
« First ‹ Previous 41 - 51 of 51
Showing 20 items per page