Skip to main content

Home/ Digiteen/ Group items tagged adult

Rss Feed Group items tagged

Vicki Davis

Attorneys sanctioned for cyberbullying | NetFamilyNews.org - 0 views

  • “Two Florida lawyers who called each other a ‘retard’ and ’scum sucking loser’ in escalating email insults [over six months] have been sanctioned by the state supreme court,”
  • The St. Petersburg Times provides the details of their pathetic email fight
  •  
    When adults act like children. ""Two Florida lawyers who called each other a 'retard' and 'scum sucking loser' in escalating email insults [over six months] have been sanctioned by the state supreme court,""
  •  
    Cyberbullying isn't just a kid thing.
stephanie j

Anytime, Anywhere Learners: Online Safety in the Virtual World - 0 views

  • Don't give your real name on gaming sitesBest not to have anyone on your IM (instant messaging) list that you don't know in the real worldYou can block people in IM and chat areasBest not to meet people you meet online, they might not be who they say they areTell an adult you trust if an online friend asks to meet youReport a contact to CEOP if you think they might be an adult
  •  
    Here are some helpful tips about online safety in a virtual world.
Joseph Edore

Safety Tips for Tweens and Teens - OnGuard Online - 0 views

  • Quick Facts While social networking sites can increase your circle of friends, they also can increase your exposure to people with less-than-friendly intentions. Here are some things you can do to socialize safely online: Think about how different sites work before deciding to join a site. Some sites allow only a defined community of users to access posted content; others allow anyone and everyone to view postings. Keep some control over the information you post by restricting access to your page. Keep your full name, Social Security number, address, phone number, and bank or credit card account numbers to yourself. Make sure your screen name doesn't say too much about you. Even if you think it makes you anonymous, it doesn't take a genius to combine clues to figure out who you are and where you can be found. Post only information that you are comfortable with others seeing and knowing. Consider not posting your photo. It can be altered or broadcast in ways you may not be happy about. Flirting with strangers online could have serious consequences. Some people lie about who they really are. Be wary if a new friend wants to meet you in person. If you decide to meet them, meet in a public place, during the day, with friends you trust. And tell a responsible adult where you're going. Trust your gut if you have suspicions. If you feel threatened by someone or uncomfortable because of something online, tell an adult you trust, and then report it to the police.
Joseph Edore

Safety Pledges - 0 views

  • Safety Pledges
  • Internet Safety Pledges "House pledges" or "acceptable-use policies" can help provide clear guidelines for safer Internet use. NetSmartz recommends using the "Internet Safety Pledge" to promote safety discussions and create safer boundaries.
  • Middle and High School Internet Safety Rules Download I WILL THINK BEFORE I POST. I agree not to post information and images that could put me at risk, embarrass me, or damage my future, such as cell & home phone numbers home address sexual messages inappropriate pictures and videos I WILL RESPECT OTHER PEOPLE ONLINE. I will not post anything rude, offensive, or threatening send or forward images and information that might embarrass, hurt, or harass someone take anyone's personal information and use it to damage his or her reputation I WILL BE CAREFUL WHEN MEETING ONLINE FRIENDS IN PERSON. I agree to ask my parent or guardian's permission before going have a parent or guardian accompany me meet in a public place I WILL PROTECT MYSELF ONLINE. If someone makes me feel uncomfortable or if someone is rude or offensive, I will not respond save the evidence tell my parent, guardian, or another trusted adult report to the website, cell phone company, CyberTipline.com, or the police
Vicki Davis

Wise Up about Wi-Fi: Tips for Using Public Wireless Networks - OnGuard Online - 1 views

  •  
    Tips from the FTC about using public wireless networks - this is important information for students and adults to know.
Steve Madsen

Cure the Bullies - 1 views

  •  
    This is truly a campaign BY kids FOR kids, addressing the audience not from an adult authoritative perspective, but a peer-to-peer behaviour awareness perspective.
  •  
    Looks to be a 'fun' way to approach such a serious subject.
Merritt D

Dealing with Cyberbullying: 5 Essential Parenting Tips - - TIME Healthland - 0 views

  •  
    Cyberbullying is a big part of many adults' parental lives. There are many cases of cyberbullling and they are getting more serious every day. Essential Parenting tips: 1.) Make sure your kids know cyberbulling is wrong 2.) Take interest in your kids' online behavior 3.) Check school policies on cyberbulling 4.) Set guidelines about cell-phone use 5.) Help your children respond appropriately if they are cyberbullied Elizabeth Englander, author of Understanding Violence and Jonathan Singer, at the Temple University of Social Work (I agree with a couple tips but some might be crossing the line between protecting their kids and taking over their online life.
Brandon P

Safety Tips - 0 views

  •  
    Website: list tips for online safety for young people. Clear, simple, easy-to-read house rules should be posted on or near the monitor. Create your own computer rules or print the Internet safety pledge. The pledge can be signed by adults and children and should be periodically reviewed
Brandon B

Internet Safety for young children. - 0 views

  •  
    Adults are not the only people that get on the internet. Young children do also and they need to know about all the stuff that goes on. This page will teach them about cyberbullying,peer pressure, and how to have self control.
Caitlin Roberts

Be Web Aware - Cyberbullying - 2 views

  • Cyberbullying
  • In school ... you don't want anyone to think of you as a "gossip" or someone who says things about other people. Everyone wants to be "nice." You don't have to be nice if you don't want to online. 13 year old girl, Edmonton
  • There is little doubt that cyberbullying, which can be the equivalent of "social death" for many young people, is traumatic. It differs from traditional, face-to-face bullying in that it is relentless and public and at the same time anonymous. Cyberbullying has turned the usual image of "the bully" on its head; it's no longer only the "tough kids" who may act aggressively – it can just as easily be the shy, quiet types, hidden behind their computers. Added to this is the potential presence of countless, invisible witnesses and/or collaborators to the cyberbullying, which creates a situation where victims are left unsure of who knows, and whom to fear.
  • ...3 more annotations...
  • Technology also extends the reach these young people have, enabling them to harass their targets anywhere and at anytime. While these situations should be reported, it can be difficult for young people to step forward: how do you report an attack that leaves no physical scars and is committed by a nameless attacker? Will the consequences of telling an adult that you are being cyberbullied be worse than the bullying itself? Adults want to help, but many feel ill-equipped to handle bullying in a digital world.
  • On social networking sites, you can now tag images with the names of people who are in the photo. This simple act can lead to cyberbullying, as these photos will appear in any search into this person’s name and it could be that misappropriated profile settings do not protect access to them.
  • Multiplayer online games and virtual worlds can be venues for harassment and cyberbullying when kids are playing or using the chat features to talk to other players. According to a 2008 Pew Internet & American Life Project report, more than half of teens who play games report seeing or hearing “people being mean and overly aggressive while playing”; a quarter of them report that this happens “often.”
  •  
    Students need to know that cyberbullying is dangerous: it can take lives, it can ruin lives, and it is not acceptable behavior for us. We are supposed to be the enlightened generation, so why don't we act like it?
  • ...2 more comments...
  •  
    Cyberbullying is probably one on the worst kinds of bullying. Its a type of bullying that never stops and never goes away. Bullies who are online can cause people to take their own lives. This isnt acceptable behavior for anyone.
  •  
    I agree with Brenna Edwards. It is one of the worst also because at school, only a hand full of people may see it, but online everyone can see it. No one should cyberbully
  •  
    I think that Brenna is right. It is really bad that people bully on the internet.
  •  
    Cyberbullying is probably one of the worst types of bullying because you can't figure out who the bully is to put a stop to it. Cyberbullies don't know how serious this is, people take their own lives because of it.
Maggie H

iPredators: Cyberbullying to cyber-harassing troll cop from hell - 1 views

  • Newsletter Subscriptions Newsletter Archives White Papers Webcasts Podcasts This Week In Print IT Jobs Community Slideshows New Data Center Solution Centers Aruba Networks Bring Your Own Device (BYOD) Aerohive Enterprise Networking Solution Center BMC Control-M Workload Automation CA Technologies Executive Resource Center CA Technologies Transform Your IT Strategy Dell 12th Generation PowerEdge Servers Solution Center HP + Microsoft Data Management Appliances & Architectures Network World Accelerating the Cloud Challenge Network World Data Center Challenge 2012 Network World Next Generation Firewall Challenge Network World Wi-Fi Challenge Riverbed Accelerate Business Performance Solution Center Silver Peak's Virtual WAN Optimization Center View all Solution Centers // Network World #nww_header ul.top_nav li.dropdown ul { display:none; } #nww_header ul.top_nav li.dropdown_active ul { background:url("http://www.networkworld.com/includes/styles/r08/img/more-back.gif") repeat-x scroll left top black; cursor:pointer !important; border:1px solid black; position:absolute; margin-top:20px; display:block; width:150px; left:0; } #nww_header ul.top_nav li.dropdown span { background-position:right center; background-repeat:no-repeat; cursor:default !important; padding:0 0 0 6px; color:#000000; height:20px; width:37px; } #nww_header ul.top_nav li ul li { background:none repeat scroll 0 0 transparent; margin-left:0; padding:0; } #nww_header ul.top_nav li.dropdown_active ul li a { background:url("http://www.networkworld.com/includes/styles/r08/img/more-sep.gif") no-repeat scroll left bottom transparent; cursor:pointer !important; text-decoration:none; padding-bottom:5px; padding-left:10px; line-height:11px; padding-top:3px; color:#EEEEEE; display:block; width:130px; } #nww_header ul.top_nav li.dropdown_active ul li.noBackground a { background:none; } #nww_header ul.top_nav li.dropdown_active ul li a:hover { background:url("http://www.networkworld.com/includes/styles/r08/img/more-hi.gif") repeat-x scroll left bottom transparent; padding-right:10px; width:129px; } function isMoreHovering() { $("#morepopupcontainer").bind("mouseleave", function() { $("#morepopupcontainer").hide(); }); $("#morepopupcontainer").show(); } $(document).ready(function() { $('.dropdown').hover( function () { $(this).addClass("dropdown_active"); }, function () { $(this).removeClass("dropdown_active"); } ); }); News Blogs & Columns &lpos=Nav:Ut
  • Back to Microsoft SubnetPrivacy and Security FanaticMs. Smith -- Select Microsoft Subnet Blog --Author expert: Microsoft Expression Web 3Brian Egler's SQL Server StrategiesEssential SharePointManaging MicrosoftMicrosoft Explorer Microsoft InsightsMicrosoft, Google and cloud tech newsMostly MicrosoftPrivacy and Security FanaticRated Critical: A Microsoft Security BlogSecrets of Windows Back Office ServersSQL Marklar The Best Microsoft VideosThe Social EnterpriseWatch Your Assets Previous Article iPredators: Cyberbullying to cyber-harassing troll cop from hellOctober is pegged to raise awareness about cyberbullying, cybersecurity and domestic violence, but an iPredator can play a part in all three. While getting help from the authorities is not always easy, what about when the cyber-creep doing the harassing and trolling is a cop? By Ms. Smith on Wed, 10/24/12 - 12:24pm. window.fbAsyncInit = function() { FB.init({ appId : '147094931979429', //NWW appId channelUrl : '//www.networkworld.com/community/sites/all/modules/nwmisc/channel.html', status : true, // check login status cookie : true, // enable cookies to allow the server to access the session xfbml : true // parse XFBML }); FB.Event.subscribe('edge.create', function(response) { if(typeof(OPG.Tracking.omniture_tl) != 'undefined') OPG.Tracking.omniture_tl('Social Click Complete', 'default'); }); }; (function(d, s, id) { var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) return; js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/all.js#xfbml=1"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); 4 Comments Print document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); clas
  • When it comes to cyberbullying, there are thousands of articles online about the tragic suicide of 15-year-old Amanda Todd and how Anonymous may have unmasked the man who bullied her into sending pictures which he later posted online and sent to her friends. While the man responsible for tormenting the Canadian teenager was a creep and a bully, since an adult was involved then it technically wasn't cyberbullying, according to Stop cyberbullying.
  •  
    October is cybersecurity month and bullying prevention awareness month.
William B

Cyber Bullying Statistics - Bullying Statistics - 0 views

  • Over half of adolescents and teens have been bullied online, and about the same number have engaged in cyber bullying. More than 1 in 3 young people have experienced cyberthreats online. Over 25 percent of adolescents and teens have been bullied repeatedly through their cell phones or the Internet. Well over half of young people do not tell their parents when cyber bullying occurs.
  • Over 80 percent of teens use a cell phone regularly, making it the most popular form of technology and a common medium for cyber bullying About half of young people have experienced some form of cyber bullying, and 10 to 20 percent experience it regularly Mean, hurtful comments and spreading rumors are the most common type of cyber bullying Girls are at least as likely as boys to be cyber bullies or their victims Boys are more likely to be threatened by cyber bullies than girls Cyber bullying affects all races Cyber bullying victims are more likely to have low self esteem and to consider suicide
  • Talks to teens about cyber bullying, explaining that it is wrong and can have serious consequences. Make a rule that teens may not send mean or damaging messages, even if someone else started it, or suggestive pictures or messages or they will lose their cell phone and computer privileges for a time. Encourage teens to tell an adult if cyber bullying is occurring. Tell them if they are the victims they will not be punished, and reassure them that being bullied is not their fault. Teens should keep cyber bullying messages as proof that the cyber bullying is occurring. The teens' parents may want to talk to the parents of the cyber bully, to the bully's Internet or cell phone provider, and/or to the police about the messages, especially if they are threatening or sexual in nature. Try blocking the person sending the messages. It may be necessary to get a new phone number or email address and to be more cautious about giving out the new number or address. Teens should never tell their password to anyone except a parent, and should not write it down in a place where it could be found by others. Teens should not share anything through text or instant messaging on their cell phone or the Internet that they would not want to be made public - remind teens that the person they are talking to in messages or online may not be who they think they are, and that things posted electronically may not be secure. Encourage teens never to share personal information online or to meet someone they only know online. Keep the computer in a shared space like the family room, and do not allow teens to have Internet access in their own rooms. Encourage teens to have times when they turn off the technology, such as at family meals or after a certain time at night. Parents may want to wait until high school to allow their teens to have their own email and cell phone accounts, and even then parents should still have access to the accounts.
  •  
    Many people get Cyber Bulling over online activities. People need to make their websites and pages private and know how to use it. "Over half of adolescents and teens have been bullied online, and about the same number have engaged in cyber bullying. More than 1 in 3 young people have experienced cyberthreats online. Over 25 percent of adolescents and teens have been bullied repeatedly through their cell phones or the Internet. Well over half of young people do not tell their parents when cyber bullying occurs."
Blakelee H

How Do Computers Affect The Social Behavior Of Children? | LIVESTRONG.COM - 3 views

  • Effects of Moderate Use A moderate amount of computer use and game playing doesn't seem to affect social development. The social behavior of moderate computer users and nonusers was roughly the same in terms of sociability and relationships with friends and family. However, heavy computer users tended to believe they had less control over their lives than their classmates, a possible indication of inadequate socialization. Increased Hostility and Aggression After the massacre at Columbine High School in 1999, researchers and educators paid more attention to violent video games such as Doom, the daily game of choice for one of the two teenage killers. Many studies show that violent TV shows increase aggression and hostility in both children and adults. It appears the same is true of computer games. The key variable appears to be a preference for violent games, rather than the amount of time a child plays such games. Even playing Mortal Kombat for a short time increases a child's hostility and aggression. Violent computer games also desensitize children, who show less empathy and willingness to help others, according to research cited in "The Future of Children." Brain Drain In a small study of 18 Chinese university students, published in the "PLos ONE" journal and reported on Mail Online, kids who played games on their computers at least eight hours a day, six days per week showed alarming amounts of atrophy in parts of their brain, as measured by MRI scans. The scans also found abnormalities in the white matter of the brain, which coordinate communication between different areas of the mind. On Mail Online, Dr. Aric Sigman of the Royal Society of Medicine called the July 2011 report a "wake-up call." Experts fear that in addition to cognitive damage, heavy Internet use might reduce the inhibitions and decision-making ability of children, leading to damaged relationships with family members, peers and authority figures.
  •  
    Moderate use of internet and computers do not affect young people. Heavy use, however creates increased hostility and aggression, and can cause one to become "brain dead."
Blakelee H

Internet Addiction Left My Brother Homeless - Newsweek and The Daily Beast - 0 views

  • Internet addiction sounds like a punch line. But it ruined my brother's life. Print Email Comments (Page 1 of 3) Last Friday I walked into the most recent inpatient Internet addiction treatment center to open in the United States and asked a really dumb question. "Do you have Wi-Fi here?" I bumbled, prompting an awkward smile from the man who opened the door at the Fall City, Wash.-based ReSTART Internet Addiction Recovery Program. It was the equivalent of walking into an Alcoholics Anonymous meeting and asking for a single-malt Scotch.It was also revealing. I hadn't checked my e-mail, Facebook, or Twitter accounts for nearly 14 hours by the time I showed up at the wooded five-acre retreat, situated with some irony less than 15 miles from Microsoft Corp.'s Redmond headquarters. That drought had begun to eat away at me enough that by the time I walked through the door I was so fixated on plugging back in that my brain was able to push past the blatant insensitivity it took to ask such a question.Most of my friends smirked when I told them I was heading up to Washington to write a story about the newly opened center, which sits on a wooded parcel of property adorned with a 3,500-square-foot craftsman house, Western red cedar treehouses, chicken coops, and goat pens. We all kid about being hooked on Facebook, but it doesn't really seem like the kind of thing anybody would need to drop $14,000 (the cost of a 45-day stay at ReSTART) on to quit cold turkey. The fact is, though, I have believed for some time now that Internet addiction is a very real phenomenon. And not just because I've read stories about the well-established and at-capacity treatment centers in China and South Korea, or because I know antisocial kids who routinely put in 14-hour shifts playing World of Warcraft. Internet addiction is the reason my 36-year-old brother has been homeless for most of his adult life.I hadn't really understood this until recently, because having a homeless brother always terrified me too much to make any real effort to understand why Andrew could never get his life together. A couple of years ago I decided I'd protected myself from this depressing truth long enough. I contacted my brother and said I wanted to spend a day with him, from the moment he awoke to the time he went to sleep, to see what his life was like. I approached the trip with a journalist's curiosity and method—a pen and steno pad—but it was obviously going to be a personal expedition.Andrew, who is four years older than I am, sleeps in a roomy tent, atop three mattresses he's acquired from one place or another, between a set of railroad tracks and Oregon State Highway 99, in a clearing ringed by blackberry bushes. He lives most days the same way. He gets up when he feels like it, walks to the local Grocery Outlet, and uses food stamps to buy a microwaveable meal. Then he treks over to the local soup kitchen and enjoys a free lunch, answering the greetings of his other homeless pals, who speak to me highly of the obese, bearded man they call "Ace."When the rest of his buddies head off to the park to suck down malt liquor or puff weed, Andrew eyes a different fix at the Oregon State University computer lab, which is open to the public. He'll spend the next 10 hours or so there, eyes focused on a computer screen, pausing only to heat up that microwaved meal. He plays role-playing videogames such as World of Warcraft, but he's also got a page of RSS feeds that makes my head spin, filled with blogs he's interested in, news Web sites, and other tentacles into cyberspace. He goes "home" only when the lab closes. He's recently acquired a laptop, after much fundraising from sympathetic relatives, so he can now stay connected day and night, if he can find an open Wi-Fi hot spot.Through the day I peppered him with questions, all meant to answer this one: why had he failed to make something of himself, and I hadn't? It was a complicated question, but it
Brianna W

Steve Harvey's ex-wife blasts comedian in YouTube videos - CNN - 2 views

  •  
    This is about a comedian's ex wife putting videos of their marriage falling apart on youtube. She is being sued for not having rights to post stuff about him on youtube. She posted 3 26 minute videos on it.
Susan Davis

10 Best Rules of Netiquette - Associated Content from Yahoo! - associatedcontent.com - 3 views

  • 2. No "Flaming": Flaming is a form of verbal abuse when you intentionally attack or disrespect somebody for whatever reason.
  • Good internet etiquette (netiquette) is all about being courteous to others online to make the internet a fun experience for everyone.
  •  
    "1.The Golden Rule: Treat others as you would like to be treated. This rule is an oldie but a goodie and can get you through just about any situation, online or off! 2. No "Flaming": Flaming is a form of verbal abuse when you intentionally attack or disrespect somebody for whatever reason. Maybe you didn't agree with something they said, but there's a nice way to share a different point of view without name calling or attacking someone. Harassing or insulting someone will not likely help you gain many online friends! 3. Respect Others' Copyrights: There are wonderful things online, information for everyone on just about any topic! However, these things have copyrights and licenses. Copying the works of someone else without permission or saying it is your own will not only ruin your online reputation, but could land you with hefty fines and lawsuits! 4. DON'T TYPE IN ALL CAPS: It hurts our eyes. It makes people think you are shouting at them. It's okay to type in caps to accentuate a word or two, but please don't do it all the time everywhere you go. 5. Don't Spam: As a blog owner, I get hundreds of spam messages each day. Most of them aren't even legible, with things like "kjhgsawu" typed in the comments and links to sites with adult or inappropriate content. I don't appreciate it! Some spammers are getting really sneaky, as they use the same generic post over and over again like "I really like your blog" - if you own multiple blogs like I do though you can quickly identify these types of spammers! There's a fine line between spam and self-promotion, do it very carefully! "
James D

digiteen2008 - Digital Rights and Responsibilities - 1 views

  • Cyber-bullying is a growing problem that has torn many families apart. Some kids have actually gone as far as committing suicide
  • . Most adults are expected to show responsibiliy and follow the law while on the web.
  • extended to every digital citizen.
  • ...7 more annotations...
  • There is a basic set of rights
  • Many of their toys involve the use of the internet, and as children they may not know how to use the internet responsibly.
  • nternet is becoming a bigger and bigger part of the peaople of todays way of life this means that everybody has to contribute to keeping it safe and fun and easy to use.
  • Nine out of ten students get bullied on the web.
  • Identity theft is a crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, usually for profitable gain.
  • The internet as a whole is a privilege.
  • Our responsibility as digital citizens is to stop identity theft, and other harmful things on the internet. Here are some steps into stopping identity theft. - Keep all identification and financial documents in a safe and private place. - Check your credit reports annually - Don’t carry around credit, debit, or ATM cards you don’t need. - Update virus protection software periodically
  •  
    stuff
  •  
    james
Vicki Davis

New ID theft targets kids' Social Security numbers | Washington Examiner - 3 views

  • The latest form of identity theft doesn't depend on stealing your Social Security number. Now thieves are targeting your kid's number long before the little one even has a bank account.
    • Jillian N
       
      People are stealing not adults social security numbers but kids even before they have bank accounts
  • "If people are obtaining enough credit by fraud, we're back to another financial collapse," said Linda Marshall, an assistant U.S. attorney in Kansas City. "We tend to talk about it as the next wave."
  • Online companies use computers and publicly available information to find random Social Security numbers. The numbers are run through public databases to determine whether anyone is using them to obtain credit. If not, they are offered for sale for a few hundred to several thousand dollars.Because the numbers often come from young children who have no money of their own, they carry no spending history and offer a chance to open a new, unblemished line of credit. People who buy the numbers can then quickly build their credit rating in a process called "piggybacking," which involves linking to someone else's credit file.Many of the business selling the numbers promise to raise customers' credit scores to 700 or 800 within six months.If they default on their payments, and the credit is withdrawn, the same people can simply buy another number and start the process again, causing a steep spiral of debt that could conceivably go on for years before creditors discover the fraud
  • ...2 more annotations...
  • A "clean" CPN is a number that has been validated as an active Social Security number and is not on file with the credit bureaus. The most likely source of such numbers are children and longtime prison inmates, experts said.
  • "Those are the numbers criminals want. They can use them several years without being detected," Damosi said. "There are not enough services that look at protecting the Social Security numbers or credit history of minors."
  •  
    The new Identity theft steals children's social security numbers before they have bank accounts.
  •  
    This article is very interesting and I didn't know why people try to take little kid's social security numbers before i read this article.( this may be caused by the recent econimical failure in the past years.) Isn't it illegal for businesses to sell card numbers though?
Anne Baird

Education Week's Digital Directions: Open-Content Licensing - 0 views

  •  
    discussion of the issue of copyright and ownership and sharing of content
‹ Previous 21 - 40 of 49 Next ›
Showing 20 items per page