Skip to main content

Home/ Digiteen/ Group items tagged and

Rss Feed Group items tagged

wildcat wildcat

digiteen2008 - Digital Etiquette - 3 views

  • Good etiquette is shown by having a proper education, manners and a sense of tact.
  • Etiquette mainly appears when someone has guests, meets with other people, or during meals.
  • Etiquette: Key terms Etiquette: rules governing socially acceptable behavior. Propriety: correct or appropriate behavior. Manners: a polite or well bred social behavior or habits Proper: marked by suitability or rightness or appropriateness. Education: the activities of educating or instructing; activities that impart knowledge or skill. Respect: an attitude of admiration or esteem. Civilized: having a high state of culture and development both social and technological. Social: living together or enjoying life in communities or organized groups. Tact: the ability to speak without offending others. Polite: showing regard for others in manners, speech, behavior. Impression: mental picture: a clear and telling mental image. Cleanliness: the habit of keeping free of superficial imperfections, diligence in keeping clean. Sophisticated: having or appealing to those having worldly knowledge and refinement. Society: an extended social group having a distinctive cultural and economic organization.
  • ...14 more annotations...
  • Digital Etiquette 1. Here is some tips that you should follow when talking online, texting, or emailing: 2. Say Hello before you start talking. It’s polite and it can make somebody happy knowing that somebody is nice enough to say hello. 3. Try to avoid replying “Sure”. A person will go crazy trying to figure out “Sure” what? Also, depending on who you are talking to online, the person may know little of your language and might not understand what you are saying, so be patient. 4. Avoid trailing off. If you stop responding to somebody all of the sudden they might think you’re ignoring them. If you have to go and do something say “BRB” or “one sec”. It will calm any worries, which the person has, who you are communicating to. 5. Don’t post people’s photos without their permission. Somebody might have a religion where they're not allowed to have they're pictures online. 6. Accept differences. Everybody has different beliefs. Don’t make fun of somebody’s religion or country because people can really get offended about what you say. 7. Talk about things that are appropriate. Chat rooms are for anyone who wants to talk to new people. One inappropriate comment can ruin it for everyone. You should always be aware to whom you are talking to and if they ask you to do anything which you feel uncomfortable about then tell an adult immediately so then the problem won't get out of hands. 8. Say bye before you leave the person whether its in person or online. You could seriously hurt somebody’s feelings if you just stop talking to them. 9. Be careful the way you type something. What you write can sound very different than what you mean. Read your writing before you press send. It could save you from an embarrassing situation. 10. Avoid writing in all capital letters. It looks like you're shouting. Wouldn't you think I was shouting if you saw this, DON'T WRITE IN ALL CAPITAL LETTERS.
  • Access Communication Literacy Student Environment Security and Safety Etiquette Rights and Responsibilities Student Life Outside Commerce Law Health and Wellness Class Actions American School of Madrid Spain Anand Vidya Vihar India Aspengrove School Canada Badshah Faisal Islami Institute Bangladesh La Grange USA Pahartali Girls High School Bangladesh Rani Bilashmoni Govt. Boys High School Bangladesh Troy Middle School USA Qatar Academy Qatar Wedderburn College Australia Westwood Schools USA Information Social & Ethical Issues Rubrics Teachers Template sj32 · My Wikis · · My Account · Help · Sign Out · Digital Etiquette page Details and TagsPrint PDF Backlinks Source Delete Rename Redirect Permissions Lock discussion (39) history notify me Details last edit Friday, 12:46 pm by kcaise - 124 revisions Tags none Type a tag name. Press comma or enter to add another. Cancel Table of ContentsDigital Etiquette 1. Overview/Description of the various aspects of the topic. Elementary Aged Students Middle/ High School Aged Students Email Etiquette: BE A SPORT, AND KEEP IT SHORT: NON MIND READERS FRIENDLY, PLEASE!: graTipos and.grammar! can caus cauz ishueezz? (typos and grammar... can cause issues!) BUISNESS FOR BUSYNESS!!! BE PLASTIC-ON-THE-SCREEN-CLEAR!!! A
  • Digital Etiquette or netiquette is a basic set of rules you should follow to make the internet a better place for other people and yourself.
  • When you instant message, chat, or email someone over the internet, that person can't tell if your just joking because they can't see your face. Don't say stuff over the internet that can be taken the wrong way or can hurt someones feelings
  • The internet takes over some peoples lives and people can get brain washed so easily when on the computer. Hacking other computers, using bad language, downloading illegally, and plagiarism are examples of having bad or no etiquette when it comes to the internet.
  • Etiquette is a set of rules dealing with exterior form
  • Middle/ High School Aged Students Teenagers these days are only on the internet to chat with their friends they know, or to look at cool videos or pictures.Myspace and Facebook are easy ways for teenagers to get access to the internet. These two websites have caused a lot of controversies over the internet because some teenagers will put bad pictures on the internet of themselves or other people. Every once in a while fights will occur between people who are trying to make each other look bad. It gives them a bad reputation and it ruins friendships all over the world. I just think that if teenagers would act mature then a lot of these things would not happen.
  • Online plagiarism is where internet users copy or use part of your or someone else's work. It is definitely not acceptable and is becoming a major issue. People need to have the right to place information on the internet knowing that it will not be copied for other people's work. Plagiarism is illegal but people still don't get the message. Plagiarism really could start major problems like people not writing the truth on the internet or making up information just to teach people a lesson. If someone is going to copy other people's work really they are better off handing the work in late or not at all. Using people's ideas is okay if you give them recognition or asked them. Plagiarism is equal to lying, if not worse. People are being generous by putting their knowledge on the internet to help people not to do it for people. Have courtesy and respect- don't copy peoples work use it as a guide and acknowledge them for their work and help. Plagerism- it's illegal so do the right thing.
  • ownloading illegally is one of the things not do in digital etiquette. Using file sharing programs such as KaZaA, Bit Torrent, iMesh, and Lime Wire to share or obtain copyrighted music, movies, games, and other software without the permission of the copyright holder is illegal. Stealing music has lots of effects once done. Some of the effects are listed below. Stealing music is against the law. Stealing music betrays the songwriters and recording artists who create it. Stealing music stifles the careers of new artists and up-and-coming bands. Stealing music threatens the livelihood of the thousands of working people—from recording engineers to Christian music retailers and their staffs —who are employed in this ministry.
  • Downloading Illegally
  • Some ways on avoiding stealing music are: Read user agreements carefully. Check the Web sites of the musicians, record companies, or movie studios to see if they allow distribution of their materials on the Internet. When purchasing music, movies, games, software, or other materials, read the license carefully to learn if you have permission to convert materials to other formats for personal use. Don't share or distribute materials unless you have permission. Of course, there are consequences to this kind of action. For one you can be fined of at least $500 dollars. The online infringement of copyrighted music can be punished by up to 3 years in prison and $250,000 in fines," the website said. "Repeat offenders can be imprisoned up to 6 years. Individuals also may be held civilly liable, regardless of whether the activity is for profit, for actual damages or lost profits, or for statutory damages up to $150,000 per infringed copyright. " To avoid these kinds of consequences you must avoid downloading illegally. I suggest that you follow the ways on avoiding these sort of consequences.
  • Some people have had both positively and negatively affected by internet etiquette. An example of negative etiquette on the internet is like if a person copies somebody's work without their permission and then the person who got copied goes and deletes that person's work
  • Don't type in all caps it looks like you're shouting which can offend some people which are on the other end of the computer because when you are talking to a person in face its easier to get your point across than talking online. Also if you try to do humor on the computer someone might not know that it is humor, and might take it as personal and you can get in trouble in all sorts of ways. Another thing is don't send rude messages or offensive e-mails to one another. It bad manners and it can get way out of hand in no time. Although you might be a pro at cyberspace be nice to the new comers. For a new comer on computers it is like learning a different language for them. Computers take a lot of practice and it is also called for mistakes. So be nice to everyone you meet and also try to help them if you can.
  • Another example is if you do something very funny and one of your friends got you on video tape and he goes and posts it on YouTube
  •  
    What etiquettet is
  •  
    "Digital Etiquette or netiquette is a basic set of rules you should follow to make the internet a better place for other people and yourself"
Kelby W

Privacy Tips - 0 views

  •  
    Not all websites are trust worthy. Here are some tips to help be a little more safe with your privacy online. "TIP #1: Do Some New Year's (Data) House Cleaning Get New Passwords: Use different, strong passwords for each of your online accounts so if one is compromised the rest are safe. Strong passwords contains letters, numbers, different cases, and symbols. Check your password's strength here. Close Old Online Accounts: Unused online accounts are a liability. Hackers could use them to infiltrate your more important accounts . Get rid of them. If you can't remember where you have old accounts search your email inbox with queries like "registered", "confirm" or "your account" to find email records of old accounts. Cull Your Friends List: You put a lot of information about yourself on social networks. Would you want that friend of a friend you met once, two years ago to be carrying around a physical copy of all that information? Probably not. Keep the people you know and trust. Delete the rest. Go Paperless: Still receiving bank statements and doctors' invoices by mail? You don't need your Social Security number floating around in your trash can on the curb outside. Call your bank, doctor, credit card company etc. to find out if you can go paperless and manage your records via a secure online portal. You'll save a tree and protect your privacy. Shred Sensitive Documents: Those credit card and health savings account statements you don't need that have been sitting in that folder in your desk? They're a privacy liability. Get rid of them (securely, using a shredder). Privacy Tips Browser Privacy  Back to top Web browsers have evolved into highly customizable software platforms capable of controlling and protecting much of the information that flows between you and the parties you interact with online. Modern browsers have an impressive array of privacy enhancing capabilities and options. They can, for example, warn you before you visit suspicious or fraudul
Brody C

digiteen2008 - Digital Security and Safety - 0 views

  • Middle/ High School Aged Students A lot of middle and high school students are members of websites like Myspace and Facebook. To some teens, these websites become addictive and they become so obsessed with talking to people that they start talking to anybody. They need to learn to not put personal information on their page like their phone number or their address because some of the people who look at that would want to hurt them. Another problem with teens is that some of them download illegal music and videos. Two of the most common sites are Frostwire and Limewire. Another thing some teens do is download free software and then their computers run really slow. That's because spyware is usually packaged with the free software. Three ways to keep your computer safe is "only download free software from reputable sites, kids and teens should be told to ask permission before downloading anything, and you can eliminate most spyware by downloading the free Microsoft Windows Defender and scanning your PC." [2]
  • Many people don't realize how important it is to have a secure password. A password is like a key to the door of your personal space on the internet. It is extremely important to keep your password safe. Some ways to choose a secure password are to use a word(s) that is totally unrelated to you. DO NOT use your maiden name, your dogs name, your phone number, your birthday, or any other things that could be related to you. A word on its own isn't very strong, so to increase strength you can add numbers and or symbols. An example of this is if you use the word " apple ", on its own it won't be very secure. If you were to put some numbers and symbols, then it would make it " apple321 " and it would be more secure. If you were to make some of the lower case letters capitals, "aPpLe321 " then it would be even stronger. If you wanted the most secure password possible, then you could insert some symbols, making it " (aPpLe321) "After 30-60 days of using the same password, it would be wise to alter or change your password. You should also use different passwords for different applications. If you would like to test your password, click here
  • 2. How safety and security positively and negatively impacts people How safety & Security positively impacts people you can know where you can rely on some of the website or blogs you feel comfortable to talk to each other sometimes when you are in a reliable website you don't have to tell every single thing about yourself to people online How safety & Security negatively impacts people sometimes strangers can put weird/inappropriate pictures online of you in other sites without your permission you may accidentally reveal your personal information to other strangers and might get in danger people sometimes bully other people they don't know sometimes, the predators make websites to attack you. They make you think the website is reliable and forces you to tell them your personal information
  • ...7 more annotations...
  • Cyber Stalking: This one of the most dangerous things on the internet; people every day are blackmailed into giving personal info like Accounts, credit card numbers, and others info. If you receive or see: · Threatening E-Mails · Post showing you differently to destroy your character · Info About your life posted on the internet
  • Middle/ High School Aged Students Teenagers everywhere use blogs such as Myspace and Facebook. They need to be safe and secure while they do these, as online predators with bad intents can find you if you give to much information. We as teens must obey online laws and common sense.When online teens usually disregard things there parents tell them. Sexual and online predators can ruin a person's childhood if they are able to find them. They can also put the wrong ideas into the minds of children, making them unwanted and bad for your health.
  • Middle/ High School Aged Students Teens use Myspace and Facebook to talk to their friends and stuff. Although, others that they don't know just might become interested in them. Online predators try their best to find out where you live. If they do, it can be bad for your health and childhood. On one website, I found a story in which a real life person fell in love with someone on the Internet. It turned out she left with him for a while and it turned out he was a sexual predator. Always be safe on the Internet.
  • Middle/ High School Aged Students One possible solution is to be safe while blogging. Also, never have a personal meeting. Never include your full name, address, or school, as they can look up your name and find you. Never put pictures online that could help online predators find you. If someone who talks to you online does not seem right or makes you nervous just stop talking to them and tell an adult. Just let them handle it because they are smarter and wiser in those kind of situations.
  • B. Middle / High School Aged Students Teens need to be safe and never give out information Be careful what they download. Be their selves because they don't need to be what they're not. Not talk to strangers.
  • Blogging Tips for Teenagers Being safe on blogs and other websites is very important. I have found some tips to help us be safer on the Internet, which is an important part of a teenager’s everyday life. The first way to be safe is to avoid posts that enable online predators to find and locate you. This means to not give information out like where you go to hang out, your name (last name especially), where your school is and its name, and especially where you live, because everybody can see what you write including the predator. Most people don't know this, but if you give out your phone number, than anybody, including a predator, can type your phone number into google and then they can see where you live. This helps a predator lead straight to you. If someone asks you for private information, DO NOT give it to them. It should be a red flag for you to ignore him or leave the chat room. Also, in chat rooms, if you feel something is going wrong and you feel uncomfortable with anything, leave the chat room immediately. Never have your screen name the same as a nick name. Online predators can sometimes track you down by screen names, which are private unless you give them out. Remember, if your going to have a blog or belong to a chat room, be safe and follow the rules. Also if you find something abnormal online, tell an adult you know and someone you can trust 100%. Always be yourself when on an online blog, which means never put fake information about yourself. In addition, always be respectful to others. If you write a bad comment, it might come back to you. Also, don’t put many pictures about yourself unless you can trust who your sending pictures to. It only helps online predators having a picture of you. Never, never have an in-person meeting. You never know if the person you are meeting has bad intentions. Be honest about your age. If there is an age limit on a chat room then there is probably a reason for one. You never know what you are getting into on the internet. The last tip is that you shouldn't meet anybody without your parent's permission. The reason is because even though you think you know very well the person by catting with them online for few years, it might be the predator that wants to harm you. The predator might told you the false information that he/she is the same age as you or live near your house. So you have to be careful if you are meeting the right person. Adults Although adults are able to have a form of independence, safety and security is very important. They have to be cautious about doing things like online banking or putting personal information online. Adults who put credit card numbers and other personal information should be aware of pharming and phishing. Many adults believe because they are experienced, they know how to be safe. They need to make sure the website they are putting personal information on is secure. You need to look for the "https" at the link of the website. When adults commonly think of online safety they think of online fraud. Identity takers feed off information given out online. If you are a victim of identity fraud it could have an effect on your future. Other than just internet fraud another thing adults have to worry about while online is cyber stalking. Cyber stalking is another way of harassment through the computer. Cyberstalking includes threatening emails, people posting private information about you for others to see, and posing as you online. Many adults seem to feel like they're older so they are less likely at risk for having predators after them. This is not the case. Websites such as eharmony.com and match.com are websites that leave predators open to find people. If you do plan on meeting someone you meet at one of these sites you should make your date at a public place and make sure not to be alone.
  • Digital Security and Safety is an issue that relates to a person's well-being and safety on a computer. Safety and security are two topics that are closely related. Security is the condition of being protected against danger, loss, and criminals. Safety is the condition of being protected against non-desirable events. Some studies have shown "The odds of becoming a cyber victim have dropped to 1 in 6, from 1 in 4 last year.[1] Some examples of potentially unsafe sites online are Facebook and Myspace, which can sometimes can be dangerous because there can be bullying online. On facebook and myspace you can put your picture or pictures on and some people put inapporaite pictures on, which is not safe because thier are always predators out there on the internet and they could see your picture and ask to meet. If you agree to go and meet them then you could be injured.
William B

Internet Addiction & Health Effects | LIVESTRONG.COM - 0 views

  • Anna Cocke graduated from CUNY with a Master of Arts in Journalism, specializing in health and medicine reporting. She has helped produce segments for the Association of Health Care Journalists on health care reform and reported on diabetes in the South Bronx. She has been writing professionally for more than seven years. Photo Credit computer image by blaine stiger from Fotolia.com The Internet has become an integral part of many people's work and personal lives. The number of people online daily has nearly doubled over the past decade, according to research conducted by the Pew Internet and American Life Project. While internet addiction as a specific disorder was being debated for inclusion in the American Psychiatric Association's Diagnostic and Statistical Manual of Mental Disorders as of 2010, treatment centers already exist throughout the U.S. and abroad, including China, Taiwan and Korea. Physical Effects Internet overuse can lead to sedentary lifestyles, weight gain and a decline in physical fitness. Other symptoms can include carpal tunnel syndrome, dry eyes, migraine headaches, a decline in personal hygiene and back aches, according to Maressa Hecht, founder of Computer Addiction Services and a member of the Harvard Medical School. if(typeof disable_adsense_2 === "undefined") { ad_order_2 = (typeof ad_order_2 === "undefined") ? "2" : ad_order_2; ad_client = "ca-livestrong_html"; num_ads = "1"; type = "text"; channels = "art_sub_top_Addiction_Recovery,article_top_diseases,article_top"; class_name = "adsense_afc"; print_google_ad(ad_order_2, num_ads, type, channels, ad_client , class_name ); } Sponsored LinksHow to Stay Asleep Obey this one weird trick to stay asleep all night long. Learn more. www.PeakLife.com/TrySomnapure Depression Depression has also been linked to Internet overuse by researchers at the Institute of Psychological Sciences in Leeds, UK. Researchers found that study participants who exhibited signs of Internet overuse engaged disproportionately than the normal population in sites devoted to pornography, gaming, social networking and chat rooms. They theorized that Internet addicts' use of these sites as replacements for real-life socializing was resulting in depression. However, there is debate as to whether depression results from, or is a cause, or internet overuse. A study published in the "Archives of Pediatrics and Adolescent Medicine" found depression, as well as ADHD and social phobia, to increase the chances of excessive Internet use in adolescents. Sleep Disturbances Evidence also suggests that internet overuse can contribute to sleep disturbances. Studies of Chinese and American children, published in the "Journal of Sleep" and the "Journal of the American Academy of Pediatrics," found that computer use among adolescents was associated with later bed times, later waking times, less restful sleep and an overall decrease in sleep. The use of computers before bedtime has also raised concerns among sleep experts, including Phyllis Zee, a neuroscience professor at Northwestern University, that the light from screens is affecting circadian rhythms and possibly contributing to insomnia.
  •  
    Addiction can be very harmful to your life. You do not to be addicted to anything. Keep your health up and your body healthy. " Photo Credit computer image by blaine stiger from Fotolia.com The Internet has become an integral part of many people's work and personal lives. The number of people online daily has nearly doubled over the past decade, according to research conducted by the Pew Internet and American Life Project. While internet addiction as a specific disorder was being debated for inclusion in the American Psychiatric Association's Diagnostic and Statistical Manual of Mental Disorders as of 2010, treatment centers already exist throughout the U.S. and abroad, including China, Taiwan and Korea. Physical Effects Internet overuse can lead to sedentary lifestyles, weight gain and a decline in physical fitness. Other symptoms can include carpal tunnel syndrome, dry eyes, migraine headaches, a decline in personal hygiene and back aches, according to Maressa Hecht, founder of Computer Addiction Services and a member of the Harvard Medical School. Sponsored Links How to Stay Asleep Obey this one weird trick to stay asleep all night long. Learn more. www.PeakLife.com/TrySomnapure Depression Depression has also been linked to Internet overuse by researchers at the Institute of Psychological Sciences in Leeds, UK. Researchers found that study participants who exhibited signs of Internet overuse engaged disproportionately than the normal population in sites devoted to pornography, gaming, social networking and chat rooms. They theorized that Internet addicts' use of these sites as replacements for real-life socializing was resulting in depression. However, there is debate as to whether depression results from, or is a cause, or internet overuse. A study published in the "Archives of Pediatrics and Adolescent Medicine" found depression, as well as ADHD and social phobia, to increase the chances of excessive Internet use in adolescents. Sleep Disturbances Evidenc
William B

Help Protect Your Child's Online Reputation From Damage | Safetyweb - 0 views

  • Nearly every study performed on the topic has found not only a direct correlation between age and Internet addiction, but also one between age and neglect of work. That is to say that teenagers and young adults are more likely to be addicted to the Internet than any other age group, and among all people suffering from this addiction, teenagers and young adults are more likely to neglect work (school or employment) than older adults with similar addictive behavior. In fact, in the most widely recognized study of its kind, age was the only factor that was a direct and constant contributor to this addiction across all other factors.[1] While this may be good news, suggesting that teenagers and young adults might grow out of their addiction (or reduce their intake) as they age, because this is a new "genre" of behavior, this data might simply reveal that teenagers and young adults are "early adapters." What this means, essentially, is that they may have found this addiction before the rest of the population. If this is the case, today's Internet-Addicted teenagers and young adults may carry it with them into adulthood. In fact, Stanford University's School of Medicine found that nearly one in eight Americans suffers from at least one sign of problematic Internet abuse (although this does not in and of itself constitute addiction).[2] Internet abuse is so widespread that the DSM (Diagnostic and Statistic Manual of Mental Disorders), which is published by the American Psychiatric Association, is reported to be considering adding it to its next release, alongside such issues as bipolar disorder, schizophrenia and borderline personality disorders.[3] Indeed, as children and teenagers are still developing their brains, they may grow accustomed to the speed and flashy graphics associated with the Internet and actually adapt their physiology, developing problems such as ADHD, and becoming generally more impatient than people raised without the instant gratification offered by the Internet
  •  
    Internet addiction is one of the main addictions. Many people are addicted to the Internet. Many people need to learn not to be addicted to the Internet cause it is a bad for your health. "Nearly every study performed on the topic has found not only a direct correlation between age and Internet addiction, but also one between age and neglect of work. That is to say that teenagers and young adults are more likely to be addicted to the Internet than any other age group, and among all people suffering from this addiction, teenagers and young adults are more likely to neglect work (school or employment) than older adults with similar addictive behavior. In fact, in the most widely recognized study of its kind, age was the only factor that was a direct and constant contributor to this addiction across all other factors.[1] While this may be good news, suggesting that teenagers and young adults might grow out of their addiction (or reduce their intake) as they age, because this is a new "genre" of behavior, this data might simply reveal that teenagers and young adults are "early adapters." What this means, essentially, is that they may have found this addiction before the rest of the population. If this is the case, today's Internet-Addicted teenagers and young adults may carry it with them into adulthood. In fact, Stanford University's School of Medicine found that nearly one in eight Americans suffers from at least one sign of problematic Internet abuse (although this does not in and of itself constitute addiction).[2] Internet abuse is so widespread that the DSM (Diagnostic and Statistic Manual of Mental Disorders), which is published by the American Psychiatric Association, is reported to be considering adding it to its next release, alongside such issues as bipolar disorder, schizophrenia and borderline personality disorders.[3] Indeed, as children and teenagers are still developing their brains, they may grow accustomed to the speed and flashy graphics associate
Rachel H

Dell - Healthy Internet Habits | Dell - 0 views

  • Talk About It Talk with your kids about the Internet, and encourage them to see it as a shared, open environment in which they have social responsibilities just as they would in any physical environment.With open discussion, you can set expectations about the behavior you expect from them, curb negativity and discourage behaviors such as secrecy, boundary-pushing or thrill-seeking. You can also emphasize that online safety is something you care about and will continue to examine.Keep in mind: Enjoy the Internet along with your children, and discuss the ways in which it brings value into your lives.Stay open to your kids' questions, and encourage them to share their Internet experiences with you without fear of punishment about what they read, see or experience.Discuss how to safely interact online with others, why kids should stay away from certain types of content and individuals, and that Internet rules are there to protect kids. Teach children to trust their instincts, and to come to you if something or someone online makes them feel uncomfortable or threatened. Stay calm and remind them that they are not in trouble for bringing issues to your attention. Praise their discretion.As kids get older, keep family communications about the Internet as open and positive as you can. Talk with your kids about their online friends and activities just as you would talk about other friends and activities.
  • Set Rules for Internet Use Lay out rules for Internet use, setting clear expectations for your kids' online habits. A good set of rules should include things like the amount of time kids are allowed to be online, what types of content are appropriate and who it's okay to chat with as well as proper online conduct and good Internet citizenship.Keep in mind: The most successful rules are those that are created collaboratively. Work with your kids to draw up an online family safety contract that the whole family can agree to and sign. Discuss the rules frequently. Remind them that the rules are in place to protect your family, and that strictly maintaining privacy online can lower the risk of being targeted by online predators. Tell kids that following the rules and keeping communications open will allow them to gain freedoms as they get older. Let them know that you will reevaluate the rules over time. You can reinforce the rules you set by enabling restrictions on your PC. Windows Live Family Safety lets you set parameters that can limit Internet searches, monitor and filter specific websites, receive detailed activity reports of your child’s online activities, and let you be in control of who your child can communicate with in Windows Live Spaces, Messenger, or Hotmail1.
  • Balance Time Online Maintaining a balance between entertainment and other activities in kids' lives can be a serious challenge. The Internet has made it even more difficult, as the lines between entertainment and education are often blurred. Modeling a healthy balance between your online and offline activities is a great way to encourage children to do the same.Keep in mind: Enforce rules about the amount of time your kids may spend online, and the hours they are allowed to go online. Help your kids develop self-control, discipline and accountability regarding Internet use. Use parental controls in Windows 7 to limit PC time. Set up individual user accounts to determine how much computer time children have and what hours of the day they are allowed to use the PC, as well as which programs and games they can access.Encourage and support their participation in other activities — particularly physical pastimes with other children. If your child is reluctant, look for offline activities that tap into the same interests your kids pursue online. Watch for signs of Internet dependency. If Internet use seems excessive or begins to affect your child's school performance, health or relationships, consider professional counseling for Internet addiction.
  • ...2 more annotations...
  • Distinguish Between Fact and Opinion Let's face it: There's a lot of content on the Internet that isn't helpful or reliable. While more online fact checking happens today than previously, the ability of nearly anyone to offer opinions or build Web sites can make the Internet a confusing place for young people.Teach your kids how the Internet works, and encourage critical thinking. Train them to use a variety of online resources and to always check, question and verify what they see online. Ultimately, these skills can help your kids avoid bad situations and individuals — such as online predators — that may seek to mislead or trick Internet users. Keep in mind: Start young. Even preschool students use the Internet to look up information. Teach them early to distinguish fact from opinion, and discuss ways to recognize bias, propaganda and stereotyping.Challenge your kids to evaluate what they see online by asking: What is the purpose of this site? To entertain? To sell? Does it provide the author’s contact information or an "About Us" section? Does a company or an individual person sponsor it? Is it a public conversation? Finally, challenge them to consider whether the Internet is the best place to find the information they need.Discuss racism and other forms of hatred with your kids. Software filters can help block hateful material, but critical thinking and an awareness of history and world events can help children recognize more subtle biases.
  • Keep Personal Facts Private Online privacy is vital to your family's safety. Ensuring that your kids communicate online only with people known to them and your family can help limit their contact with unsavory elements. Still, as kids grow older, they are bound to make new friends online. As your kids grow into middle and high school, the most recent research shows that the greatest threat to their safety is actually from people in their own age group, or slightly older.Keep in mind: Ensure that children keep facts such as their real name, age, gender and location private. Discuss how details in photographs can reveal more information to would-be predators than your child intends.Many kids routinely visit social networks and blogs where they may post pictures, make comments and write personal entries. Insist that your kids keep personal information private and that they think twice before joining location-based peer groups that may give away information on their whereabouts.Ensure that your kids understand the risks involved in making private or personal information public online. Keep an open dialogue about the people they come into contact with online. Discuss and evaluate online relationships as you would any other relationships in your child’s life. In this section, we covered some basic knowledge all parents should keep in mind when their children are online. Impress upon your kids the seriousness of online safety concerns, while making sure to keep the lines of communication open and non-judgmental. In the next section, we’ll look at ways to ensure your family’s privacy online isn’t compromised.
  •  
    healthy habits for online
Brody C

Safety and Security on the Internet - 0 views

  • Why Should I Worry About Security? The Internet is a global collection of Interconnected Networks that facilitate information exchange and computer connectivity. The Internet is comprised of many different computers, all of which fall into two categories: servers (also known as "hosts") and clients (also known as "guests") -- technically, everything on the Internet can be considered a "host," but for this discussion, we'll use "hosts" and "guests." Guest machines send bursts of computer data called "packets" which are analyzed by the server belonging to the guest's Internet service provider. If the data is located locally (on the ISP's machine), the ISP's server will return the packets. If the information sought is not local (on another machine), the ISP's server hands off the packets to a router, which then sends the packets to the server containing the information. Once the information is located, it is sent back to the guest machine. There are many different types of computers that fill these two categories: mainframes, minicomputers, PCs, Macintosh, Unix and others. Despite the many varieties of computers that combine to form the Internet, every computer connected to the Internet needs to be able to communicate with every other computer -- without this ability, there is no Internet. All of these computers are able to communicate because in a sense they can all speak the same language -- TCP/IP. TCP/IP actually isn't a language; it is in computer terms what is known as a "protocol." A protocol is simply a standard for transmitting and receiving bits of information. As long as all of the interconnected computers follow the same protocol, they can exchange information. Unfortunately, when data is sent from one computer to another on the Internet, every other computer in between has an opportunity to see what's being sent. This poses an obvious security problem.
  • Say you decide to purchase concert tickets on the Web. To do so, you need to fill out an electronic form with your name, address and credit card number. When you submit the form, your information passes from computer to computer on its way to the concert ticket web server. It is possible that someone could be watching the data passing through one of the computers that is in between your computer and the concert ticket server. No one knows how often this happens, but everyone concedes it is technically possible. And its also possible off the web, too -- E-mail can be captured (and read, if not encrypted), as can file transfers via unsecure FTP. If someone wanted to, it wouldn't be too difficult to connect a capture device to someone's phone line (assuming they use a modem to connect to the Internet) and steal an electronic copy of the data exchanged on the Internet. Even if you make your purchase on a secure web site supporting the latest security features, it has been recently shown that secure sites can cause Internet Explorer (and other browsers) to send sensitive information to a non-secure server in plain text format.
  • The point is, there are a lot of security issues related to a network such as the Internet. No FAQ could possibly cover them all. That is why this FAQ concentrates on Internet Explorer. Because there are millions of people who use Microsoft Windows family products, and because those millions have the ability to blend Internet Explorer with these products, the seriousness about security should be of paramount importance to everyone. Remember,  software products are only as secure as the environment in which they operate.
  • ...2 more annotations...
  • What Security Features does Internet Explorer Have? Internet Explorer is a safe browser in many ways. The latest version of IE supports Secure Socket Layer (SSL) 2.0/3.0, Private Communication Technology (PCT) 1.0, CryptoAPI, and VeriSign certificates, and one version employs 128-bit encryption, one of the strongest forms of encryption that's commercially available for use over the Internet. To see if you have the 128-bit version of Internet Explorer, go to the Wells Fargo Bank site and take their browser test. "Secure Socket Layer (SSL) is a Netscape-developed protocol submitted to the W3C working group on security for consideration as a standard security approach for World Wide Web browsers and servers on the Internet. SSL provides a security "handshake" that is used to initiate the TCP/IP connection. This handshake results in the client and server agreeing on the level of security they will use and fulfills any authentication requirements for the connection. Thereafter, SSL's only role is to encrypt and decrypt the byte stream of the application protocol being used (for example, HTTP). This means that all the information in both the HTTP request and the HTTP response are fully encrypted, including the URL the client is requesting, any submitted form contents (such as credit card numbers), any HTTP access authorization information (usernames and passwords), and all the data returned from the server to the client." -- Microsoft's IIS 1.0 Features Tour. It has been reported, however, that SSL has been cracked. Private Communication Technology (PCT) is a Microsoft-developed security protocol available in IE only. According to their Internet draft, "The Private Communication Technology (PCT) protocol is designed to provide privacy between two communicating applications (a client and a server), and to authenticate the server and (optionally) the client. PCT assumes a reliable transport protocol (e.g., TCP) for data transmission and reception. The PCT protocol is application protocol-independent. A "higher level" application protocol (e.g., HTTP, FTP, TELNET, etc.) can layer on top of the PCT protocol transparently. The PCT protocol begins with a handshake phase that negotiates an encryption algorithm and (symmetric) session key as well as authenticating a server to the client (and, optionally, vice versa), based on certified asymmetric public keys. Once transmission of application protocol data begins, all data is encrypted using the session key negotiated during the handshake." IE also supports server and client authentication by using digital certificates to identify users to web servers. In addition, IE supports code signing with Authenticode, which verifies that downloaded code has not been modified. For more information on Authenticode, visit Microsoft's Authenticode page or the excellent Authenticode FAQ page. CryptoAPI 1.0 provides the underlying security services for the Microsoft Internet Security Framework. CryptoAPI allows developers to integrate cryptography into their applications. Microsoft has given a great deal of thought to the issue of security and it products, and Internet Explorer 4.0 is no exception. From "Security Zones" to continued support and refinement of Authenticode, IE4 promises to be one of the safest browsers of all time.  You can read all about the security available in IE 4 at http://www.microsoft.com/ie/ie40/?/ie/ie40/features/ie-security.htm. Also, check out what Microsoft is doing to keep transactions private with IE 4.
  • What are "Cookies?" Cookies are small text files that are sent to web browsers by web servers.  The main purpose of cookie files are to identify users and to present customized information based on personal preferences.  Cookie files typically contain information such as your name (or username), password information, or ad-tracking information.  There is a good body of literature on  the Internet about cookies.  Despite what you may have read or heard, most people, including myself, do not view cookies as any kind of a security threat.  However, because of the way cookies work (e.g., a web server storing a text file on someone's hard drive), Microsoft (and other browser manufacturers) have built options into their browsers that notify users when cookies are being passed to them, and give the user an option to prevent the cookie from being accepted.  I don't think this is a good idea.  By rejecting cookies, your browser may not display the entire page or the site may not function as intended. The reality is that cookies are text files -- they cannot contain viruses or execute applications, they cannot search your hard drive for information or send it to web servers, and most of the information they contain is simple tracking information designed to effect better customer service.
  •  
    safe things to do on the Internet and what to learn that is big
Merritt D

School District Holds Cyber Smart Presentation | Newport Beach Independent Newspaper | ... - 0 views

  • A few tips shared during the presentation: Give kids a code of conduct. Remind them not to post/IM/text anything they wouldn’t say to that person’s face; Discuss cyber-bullying with kids and ask if they know anyone who has been bullied; Talk about the importance of privacy and how to protect it; and discuss their online identity and possible risky behavior. “Raise good digital citizens!” a slide stated.
  •  
    Many parents are strict on their kids about the internet, not because they don't trust their kids, but because they are not well versed with the aspects of the internet! We need to get our parents informed about the internet so they will be a better example for online citizenship for their children! Tips shared to help parents with online parenting: Give kids a code of conduct. Remind them not to post/IM/text anything they wouldn't say to that person's face; Discuss cyber-bullying with kids and ask if they know anyone who has been bullied; Talk about the importance of privacy and how to protect it discuss their online identity and possible risky behavior. "Raise good digital citizens!" Kids' online activity can affect their safety, reputation, college and career options, among other things in the "real world," so it's important they're smart about their online activity.[Kids are] leaving digital prints everywhere they go," Boss said, they need to be careful where those prints are left and what they're left on. School District Holds Cyber Smart Presentation Parents learned what their kids are doing out in cyberspace on Wednesday night during the school district's Cyber Smart presentation. The district-wide event is meant to provide parents with information and resources about online safety precautions, age appropriate websites, cyber trends, how to spot, prevent and deal with internet issues, and how to protect their kids' computers and cell phones. "The whole evening is about educating parents about the technology that's out there," said Laura Boss The presentation encouraged parents to embrace their kids' digital world, support balanced use, monitor their kids' digital media use, and discuss what sites they are allowed to visit and what they can and can't download. Kids' online activity can affect their safety, reputation, college and career options, among other things in the "real world," so it's important
Maggie B

Nine Elements - 3 views

  • one has the opportunity to communicate and collaborate with anyone from anywhere and anytime. Unfortunately, many users have not been taught how to make appropriate decisions when faced with so many different digital communicatio
  • communicate with other people. In the 19th century, forms of communication were limited. In the 21st
  • Digital Citizenship
  • ...23 more annotations...
  • citizenship can be defined a
  • to create rules and policy, we must teach everyone to become responsible digital ci
  • l uncomf
  • ic standards of conduct or procedure. Technology users often see this area as one o
  • oral goods and services are surfacing such as pornography and gambling. Users need to learn about how to be effective consumers in a new digital economy. 
  • t economy is being done electronically. Legitimate and legal exchanges are occurring, but the buyer or seller need
  • n electronic society. All people should have fair access to technology no matter who they are.  Places or organizations with limited connectivity need to be addressed as well.  To become productive citizens, we need to be committed
  • norms of appropriate, responsible behavior with regard to technology use. 
  • 1.   Digital Access:   full electronic participation in society. Technology users need to be aware of and support electronic access for all to create a foundation for Digital Citizenship.
  • s the
  • Digital
  • 2.   Digital Commerce:   electronic buying and selling of goods. Technology users need to understand that a large share of marke
  • 3.   Digital Communication:   electronic exchange of information.
  • One of the significant changes within the digital revolution is a person’s ability to
  • offer a wide variety of choices (e.g., e-mail, cellular phones, instant messaging).  The expanding digital communication options have changed everything because people are able to keep in constant communication with anyone else.
  • n options.
  • 4.   Digital Literacy:   process of teaching and learning about technology and the use of technology. While schools have made great progress in the area of technology infusion, much remains to be done. A renewed focus must be made on what technologies must be taught as well as how it should be used.
  • 5. Digital Etiquette:   electron
  • 9.   Digital Security (self-protection):   electronic precautions to guarantee safety.
  • We need to have virus protection, backups of data, and surge control of our equipment. As responsible citizens, we must protect our information from outside forces that might cause disruption or harm.
  • Digital Law:   electronic responsibility for actions and deeds
  • Digital Rights & Responsibilities:   those freedoms extended to everyone in a digital world
  • Digital Health & Wellness:   physical and psychological well-being in a digital technology world.
  •  
    Most people make the wrong health decisions. When they make these decisions, they mess up their whole life. Online health is the same. If you mess up there, you mess up your life.
  • ...2 more comments...
  •  
    "Nine Themes of Digital Citizenship Digital citizenship can be defined as the norms of appropriate, responsible behavior with regard to technology use. 1. Digital Etiquette: electronic standards of conduct or procedure. Technology users often see this area as one of the most pressing problems when dealing with Digital Citizenship. We recognize inappropriate behavior when we see it, but before people use technology they do not learn digital etiquette (i.e., appropriate conduct). Many people feel uncomfortable talking to others about their digital etiquette. Often rules and regulations are created or the technology is simply banned to stop inappropriate use. It is not enough to create rules and policy, we must teach everyone to become responsible digital citizens in this new society. 2. Digital Communication: electronic exchange of information. One of the significant changes within the digital revolution is a person's ability to communicate with other people. In the 19th century, forms of communication were limited. In the 21st century, communication options have exploded to offer a wide variety of choices (e.g., e-mail, cellular phones, instant messaging). The expanding digital communication options have changed everything because people are able to keep in constant communication with anyone else. Now everyone has the opportunity to communicate and collaborate with anyone from anywhere and anytime. Unfortunately, many users have not been taught how to make appropriate decisions when faced with so many different digital communication options. 3. Digital Literacy: process of teaching and learning about technology and the use of technology. While schools have made great progress in the area of technology infusion, much remains to be done. A renewed focus must be made on what technologies must be taught as well as how it should be used. New technologies are finding their way into the work place that are not being used in schools (e.g., videoconfer
  •  
    9 elements to digital citizenship
  •  
    In order for students to be achieve digital citizenship, we must know how to communicate properly.
  •  
    Nine Themes of Digital Citizenship Digital citizenship can be defined as the norms of appropriate, responsible behavior with regard to technology use. 1. Digital Access: full electronic participation in society. Technology users need to be aware of and support electronic access for all to create a foundation for Digital Citizenship.
Dru F

Avoiding Conflict Online - 0 views

  • Diverse opinions are critical to constructive dialog. Diversity enriches a group. But there is a line between constructive critical thinking and behavior which demeans individuals and potentially destroys communities. It is a fine line with no obvious answer for a facilitator. The goal of this piece is to think about how to support diverse and divergent thinking while reducing the likelihood of personal conflict and group destruction. And this conflict often arises due to misunderstanding. So it is about conflict beteen people, not between ideas. This is an important distinction!
  •  
    When talking back and forth via email, or instant messages one must be careful not to cross any lines that would make anyone misunderstand what was meant. "Diverse opinions are critical to constructive dialog. Diversity enriches a group. But there is a line between constructive critical thinking and behavior which demeans individuals and potentially destroys communities. It is a fine line with no obvious answer for a facilitator. The goal of this piece is to think about how to support diverse and divergent thinking while reducing the likelihood of personal conflict and group destruction. And this conflict often arises due to misunderstanding. So it is about conflict beteen people, not between ideas. This is an important distinction! Before we discuss how to avoid online conflict, there are five key attributes of online communication to take into consideration: Lack of physical communication cues - We cannot see or hear the huge range of non-verbal cues we use during the course of conversation to discern if our audience is understanding, agreeing, disagreeing, getting uncomfortable or opening up. In cyberspace, we must explicitly ask for this information. Potential impersonality of the medium (distance) - Sometimes, when communicating online people may lose some of their inhibitions and say things they would not say offline. Social norms are less clear and more open to individual interpretation. Setting norms that we agree to use together can control this loss of inhibition. Asynchronicity affects the way we experience and feel about messages - When you have time to think about your response, you may be more thoughtful or you may let issues build up and get blown out of proportion. In online interactions, each of us may interpret periods of silence very differently. These subtle, unspoken issues can cloud communication. Public vs. private spaces and perceptions - People have different tolerances of what they think should be "public" or "private." T
Becca B

10 Etiquette Tips For An Online Course - 0 views

  • 1.) Participation — unlike classroom settings, you can’t just “show up” and expect to pass the class. An online class is a community, and as such all are expected to participate. Discussion posts, opinions and feedback should be thoughtful and well-articulated so that everyone can enjoy a fun learning experience. 2.) Procrastination — do not wait until the last minute to do your work! Taking an online course means working with technology, and sometimes it can fail you. Work ahead of schedule so that any problems can be taken directly to the instructor for help, without losing time. 3.) Sharing — ideas, opinions and experiences should be shared with the whole community. Classmates may post questions on the Discussion Board, which you may be able to answer. Don’t keep information to yourself; in a community, everyone works together for the good of the whole. 4.) Proofread – before you press the SEND button, think about what you have written; you can’t take it back! A response to a classmate, a discussion post, an email to the instructor, make sure that you have said what you meant and that you mean what you said! 5.) Express — classmates and teachers cannot “see you”, so you have to be clear. Sarcasm, concern and other emotions are lost in an online environment if there is not enough information to back the statement up. 6.) Feedback — give feedback to your classmates and be open to theirs. Online classes function best when everyone is involved in the learning process. 7.) Respect — do not put down anyone’s ideas or thoughts, also state your own opinion in a way that is not hostile or overwhelming. Respect your classmates and they will respect you! 8.) Caution – be careful about statements that may come off as derogatory, racist or inappropriate for the classroom setting. If you wouldn’t say it in person, don’t say it online. 9.) Cheating – treat the class like an in-room course. Do not cheat, it only hurts your learning opportunities. 10.) Work hard! — to get the most out of it, you’ve got to put your best into it! Work hard and achieve results!
  •  
    "1.) Participation - unlike classroom settings, you can't just "show up" and expect to pass the class. An online class is a community, and as such all are expected to participate. Discussion posts, opinions and feedback should be thoughtful and well-articulated so that everyone can enjoy a fun learning experience. 2.) Procrastination - do not wait until the last minute to do your work! Taking an online course means working with technology, and sometimes it can fail you. Work ahead of schedule so that any problems can be taken directly to the instructor for help, without losing time. 3.) Sharing - ideas, opinions and experiences should be shared with the whole community. Classmates may post questions on the Discussion Board, which you may be able to answer. Don't keep information to yourself; in a community, everyone works together for the good of the whole. 4.) Proofread - before you press the SEND button, think about what you have written; you can't take it back! A response to a classmate, a discussion post, an email to the instructor, make sure that you have said what you meant and that you mean what you said! 5.) Express - classmates and teachers cannot "see you", so you have to be clear. Sarcasm, concern and other emotions are lost in an online environment if there is not enough information to back the statement up. 6.) Feedback - give feedback to your classmates and be open to theirs. Online classes function best when everyone is involved in the learning process. 7.) Respect - do not put down anyone's ideas or thoughts, also state your own opinion in a way that is not hostile or overwhelming. Respect your classmates and they will respect you! 8.) Caution - be careful about statements that may come off as derogatory, racist or inappropriate for the classroom setting. If you wouldn't say it in person, don't say it online. 9.) Cheating - treat the class like an in-room course. Do not cheat, it only hurts your learning
Kelby W

Privacy & Identity | Internet Society - 0 views

  •  
    A big part of the Internet's value is the ability to interact online without giving away your personal stuff.  "Privacy is about retaining the ability to disclose data consensually, and with expectations about the context and scope of sharing. Identifiability, linkability of data, and the mining of vast quantities of aggregated information all erode the individual's ability to manage disclosure, context and scope. Networks depend on the use of unique (and often identifying) numbers, and facilitate the instant global dissemination of information; increasingly, devices and applications gather and use geolocation data that builds up into a unique 'track' for each user. A growing commercial ecosystem based on targeted and behavioural advertising results in an inexorable financial pressure for service providers to exploit personal data. The privacy implications of the current Internet represent a significant and growing concern.   Our Work The Internet Society's Trust and Identity initiative includes dedicated outreach activities on identity and privacy. These are aimed at technology vendors and adopters, to encourage privacy-respecting technology deployment, and at policymakers and legislators to provide the necessary counter-balances to commercial expediency. The Trust and Identity initiative also aims to ensure that users are better informed about the benefits of good online privacy, so that they can make better privacy choices and make use of appropriate privacy-enhancing tools online."
William B

Cyber Bullying Statistics - Bullying Statistics - 0 views

  • Over half of adolescents and teens have been bullied online, and about the same number have engaged in cyber bullying. More than 1 in 3 young people have experienced cyberthreats online. Over 25 percent of adolescents and teens have been bullied repeatedly through their cell phones or the Internet. Well over half of young people do not tell their parents when cyber bullying occurs.
  • Over 80 percent of teens use a cell phone regularly, making it the most popular form of technology and a common medium for cyber bullying About half of young people have experienced some form of cyber bullying, and 10 to 20 percent experience it regularly Mean, hurtful comments and spreading rumors are the most common type of cyber bullying Girls are at least as likely as boys to be cyber bullies or their victims Boys are more likely to be threatened by cyber bullies than girls Cyber bullying affects all races Cyber bullying victims are more likely to have low self esteem and to consider suicide
  • Talks to teens about cyber bullying, explaining that it is wrong and can have serious consequences. Make a rule that teens may not send mean or damaging messages, even if someone else started it, or suggestive pictures or messages or they will lose their cell phone and computer privileges for a time. Encourage teens to tell an adult if cyber bullying is occurring. Tell them if they are the victims they will not be punished, and reassure them that being bullied is not their fault. Teens should keep cyber bullying messages as proof that the cyber bullying is occurring. The teens' parents may want to talk to the parents of the cyber bully, to the bully's Internet or cell phone provider, and/or to the police about the messages, especially if they are threatening or sexual in nature. Try blocking the person sending the messages. It may be necessary to get a new phone number or email address and to be more cautious about giving out the new number or address. Teens should never tell their password to anyone except a parent, and should not write it down in a place where it could be found by others. Teens should not share anything through text or instant messaging on their cell phone or the Internet that they would not want to be made public - remind teens that the person they are talking to in messages or online may not be who they think they are, and that things posted electronically may not be secure. Encourage teens never to share personal information online or to meet someone they only know online. Keep the computer in a shared space like the family room, and do not allow teens to have Internet access in their own rooms. Encourage teens to have times when they turn off the technology, such as at family meals or after a certain time at night. Parents may want to wait until high school to allow their teens to have their own email and cell phone accounts, and even then parents should still have access to the accounts.
  •  
    Many people get Cyber Bulling over online activities. People need to make their websites and pages private and know how to use it. "Over half of adolescents and teens have been bullied online, and about the same number have engaged in cyber bullying. More than 1 in 3 young people have experienced cyberthreats online. Over 25 percent of adolescents and teens have been bullied repeatedly through their cell phones or the Internet. Well over half of young people do not tell their parents when cyber bullying occurs."
Molly S

Global Competence Definition | Asia Society - 0 views

  • What is Global Competence? Help us better define global competence. Send in your students' work. Be a part of a ground-breaking effort to assess student global competence. We are collecting samples of work that demonstrate student global knowledge and skills at various developmental levels. Once the work is published, it will help teachers strengthen instruction and better evaluate student work and provide examples for students to help them strive for greater achievement. With each submission, you will be entered into a regular drawing for $500 Staples gift certificates. Learn more and get involved (PDF download). A globally competent student can Investigate the World Recognize Perspectives Communicate Ideas Take Action Students investigate the world beyond their immediate environment. Students recognize their own and others’ perspective. Students communicate their ideas effectively with diverse audiences. Students translate their ideas and findings into appropriate actions to improve conditions. Students can: Generate and explain the significance of locally, regionally or globally focused researchable questions. Identify, collect and analyze the knowledge and evidence required to answer questions using a variety of international sources, media and languages. Weigh, integrate and synthesize evidence collected to construct coherent responses that is appropriate to the context of issues or problems. Develop an argument based on compelling evidence that considers multiple perspectives and draws defensible conclusions. Students can: Recognize and articulate one’s own perspective on situations, events, issues or phenomena and identify the influences on that perspective. Articulate and explain perspectives of other people, groups or schools of thought and identify the influences on those perspectives. Explain how the interaction of ideas across cultures influences the development of knowledge and situations, events, issues or phenomena. Articulate how the consequences of differential access to knowledge, technology and resources affect the quality of life and influences perspectives. Students can: Recognize that diverse audiences may perceive different meanings from the same information. Use appropriate language, behavior and strategies to effectively communicate, both verbally and non-verbally, with diverse audiences. Explain how effective communication impacts understanding and collaboration in an interdependent world. Select and effectively use appropriate technology and media to communicate with diverse audiences. Students can: Recognize one’s capacity to advocate for and contribute to improvement locally, regionally, or globally. Identify opportunities for personal and collaborative action to address situations, events, issues or phenomena in ways which can make a difference. Assess options for action based on evidence and the potential for impact, taking into account varied perspectives and potential consequences for others. Act creatively and innovatively to contribute to improvement locally, regionally or globally both personally and collaboratively.
William B

Internet addiction changes brain similar to cocaine: Study - HealthPop - CBS News - 0 views

  • iStockPhoto (CBS) Can a person be truly addicted to the Internet? A new brain scan study shows not only can that be the case, but also that Internet addiction might cause the same brain changes that are seen in alcoholics and drug addicts. For the study, published in the Jan. 11 issue of PLoS One, researchers studied 17 men and women who were diagnosed with Internet addiction disorder (IAD) and compared scans of their brains to scans of 16 healthy people who weren't addicted to the web. Study participants were between the ages of 14 and 21 and lived in China. Video Game-Obsessed Mom Neglects Kids, Starves DogsAre social networking sites turning teens into substance abusers? The researchers found more patterns of  "abnormal white matter" on brain scans of Internet addicts, compared with scans of non-addicts. White matter areas in the brain contain nerve fibers that transmit signals to other parts of the brain. These changes showed evidence of disrupting pathways related to emotions, decision-making, and self control. The researchers said earlier studies have found similar white matter changes in the brain scans of people addicted to alcohol, cocaine, heroin, marijuana, meth, and ketamine (also known as "Special K"). "The results also suggest that IAD may share psychological and neural mechanisms with other types of substance addiction and impulse control disorders," the researchers wrote in the study. Professor Gunter Schumann, chair in biological psychiatry at the Institute of Psychiatry at King's College, London, told BBC News that he's come across similar findings in brain scans of video game addicts. "For the first time two studies show changes in the neuronal connections between brain areas as well as changes in brain function in people who are frequently using the Internet or video games," he said. Dr. Henrietta Bowden Jones, consultant psychiatrist at Imperial College in London, who runs the U.K.'s only clinic for Internet addicts, said hardcore gamers are more likely to be addicted to the Internet. "The majority of people we see with serious Internet addiction are gamers - people who spend long hours in roles in various games that cause them to disregard their obligations," Jones told The Independent. "I have seen people who stopped attending university lectures, failed their degrees or their marriages broke down because they were unable to emotionally connect with anything outside the game." According to the independent, an estimated 5 to 10 percent of Internet users are unable to control their usage and are considered addicts.
  •  
    Internet addiction is just as harmful to your brain than alcohol. you don't need to damage you brain so dont drink or get addicted to anything. "(CBS) Can a person be truly addicted to the Internet? A new brain scan study shows not only can that be the case, but also that Internet addiction might cause the same brain changes that are seen in alcoholics and drug addicts. For the study, published in the Jan. 11 issue of PLoS One, researchers studied 17 men and women who were diagnosed with Internet addiction disorder (IAD) and compared scans of their brains to scans of 16 healthy people who weren't addicted to the web. Study participants were between the ages of 14 and 21 and lived in China. Video Game-Obsessed Mom Neglects Kids, Starves Dogs Are social networking sites turning teens into substance abusers? The researchers found more patterns of "abnormal white matter" on brain scans of Internet addicts, compared with scans of non-addicts. White matter areas in the brain contain nerve fibers that transmit signals to other parts of the brain. These changes showed evidence of disrupting pathways related to emotions, decision-making, and self control. The researchers said earlier studies have found similar white matter changes in the brain scans of people addicted to alcohol, cocaine, heroin, marijuana, meth, and ketamine (also known as "Special K"). "The results also suggest that IAD may share psychological and neural mechanisms with other types of substance addiction and impulse control disorders," the researchers wrote in the study. Professor Gunter Schumann, chair in biological psychiatry at the Institute of Psychiatry at King's College, London, told BBC News that he's come across similar findings in brain scans of video game addicts. "For the first time two studies show changes in the neuronal connections between brain areas as well as changes in brain function in people who are frequently using the Internet or video games," he said. Dr. Henrietta Bowde
Becca B

Netiquette - The Code of Conduct for the Internet - By Jason - 0 views

  •  
    "Never forget that the person reading your mail or posting is, indeed, a person, with feelings that can be hurt. Here are some key points to keep in mind: * It's not nice to hurt other people's feelings. Who are you trying to prove anything to? Just keep offensive comments to yourself and try to be constructive. * Never type a whole message in caps, whethere its an instant message, a reply to a post in a message board, or in an email. writing a whole message in caps means that one is yelling (unless you do not mean it that way). If you do not mean it to come across that way, make sure you tell people you are not yelling. Remember, people can not tell what mood you are in by just typing something (unless you are using a webcam and microphone of course...). So please please please do not use caps to write messages. Thanks! * Never mail or post anything you wouldn't say to your reader's face. The internet is not a place to find or pick a fight. There are people out there with the same intentions you have of just researching and just finding useful information and that is all. No need to start any trouble. Please ;] * Notify your readers when flaming. For those of you who do not know what flaming is, here is the basic definition. Flaming is when a person or group of people decide to express their negativity about a certain situation, maybe a world event or something. The reason one is told to notify people when doing this is because some people may not know you are flaming. I mean, this is the internet. It's not like you have the person sitting in front of you where you can look at their face and tell they are mad or annoyed about something. So please, let people know that the post or message you are about to post is of this kind. On a side note, flaming can also be toward people. It can be toward their beliefs, comments they may have made, ideas, etc. Please do not do this kind of flaming. Again, we are trying to eliminate unneccessary confrontations o
Brody C

Cable in the Classroom - Digital Safety - 1 views

  • Media Smart » Digital Safety    
  •   Digital SafetyInternet SafetyBullies, crooks and predators existed in the real world long before the internet came along. Just as we teach children not to talk to strangers, we have to teach them to move safely in the online world. The information in these sites can help you teach children how to protect themselves and their privacy.
  • What You Need to Know About Social Networking and MoreSocial networking is all the rage but what is it? Why do kids love it? And should parents be concerned?The Internet Keep Safe Coalition (i-KeepSafe) and MySpace have teamed up to take the mystery out of social networking and Web 2.0. In a series of short videos, you’ll learn what these terms mean, why they’re so appealing to kids, and how to keep your children safe as they take advantage of these engaging tools.
  • ...3 more annotations...
  • CyberbullyingCreated by Dr. Sameer Hinduja,  an Assistant Professor in the Department of Criminology and Criminal Justice  at Florida Atlantic University, and Dr. Justin W. Patchin, an Assistant Professor of Criminal Justice in the Department of Political Science at the University of Wisconsin-Eau Claire, this site provides cyberbullying research, stories, cases, downloads, fact sheets, tips and strategies, news headlines, a blog, and a number of other helpful resources.CybercrimeThe US Department of Justice's Cybercrime site presents tips for online safety and privacy.
  • GetNetWiseThe Internet Education Foundation’s GetNetWise helps families find the resources they need to make informed decisions about using the Internet. The site includes a safety guide, recommended sites for kids, and information about Internet filters. Topics include how to: Keep children safe online Stop unwanted e-mail and spam Protect your computer from hackers and viruses Keep your personal info private. Internet Keep Safe Coalition (iKeepSafe)The Internet Keep Safe Coalition teaches basic rules of Internet safety to children and adults through an animated character, Faux Paws the techno cat, in online stories and in books. Teacher materials, including worksheets and lesson ideas are available online. Parent materials include a video series on safety and four lessons designed for use in a family setting: Meet Faux Paw the Techno Cat What to do When Something Online Worries You Bullying and the Myth of Internet Anonymity Our Family’s Safety Contract i-SAFEi-SAFE America's mission is to educate and empower youth to safely and responsibly take control of their Internet experience. i-SAFE offers dynamic, standards-based K-12 curriculum free of charge to educate students on how to avoid dangerous or unlawful behavior. The organization also offers community outreach programs to extend Internet safety beyond the classroom. You can sign up for training classes and programs on Internet safety through iSafe’s VirtualTraining Academy.Kidz PrivacyCreated by the Federal Trade Commission, Kidz Privacy is based on the Children’s Online Privacy Protection Act and presents crucial information about protecting children’s online privacy. The site includes links to numerous government resources.
  • OnGuard OnlineOnGuard Online offers practical tips and information from the federal government to help consumers learn about and avoid becoming victims of Internet scams. Topics include ways to minimize problems when making online purchases, avoiding phishing scams (with a fun Flash animation on how to tell if you’re being phished), and defending cell phones and PDA’s against attack.
Kelby W

Did the Internet Kill Privacy? - CBS News - 0 views

  •  
    IN my opinion, if you didn't want people to see it you shouldn't put it on Facebook.  "The pictures were exactly what you'd expect from a European summer vacation: Cafes in Italy and Spain, the Guinness brewery in Ireland. So 24-year-old Ashley Payne, a public high school English teacher in Georgia, was not prepared for what happened when her principal asked to see her in August 2009. "He just asked me, 'Do you have a Facebook page?'" Payne said. "And you know, I'm confused as to why I am being asked this, but I said, 'Yes.' And he said, 'Do you have any pictures of yourself up there with alcohol?'" In fact, the picture that concerned the principal - showing Payne holding a glass of wine and a mug of beer - was on her Facebook page. There was also a reference to a local trivia contest with a profanity in its title. Payne was told a parent of one of her students called to complain. And then, Payne says, she was given a choice: resign or be suspended. "He told me that I needed to make a decision before I left, or he was going to go ahead and suspend me," she said. She resigned. Attorney Richard Storrs is fighting to get Payne's job back. "It would be like I went to a restaurant and I saw my daughter's teacher sitting there with her husband having a glass of some kind of liquid," Storr said. "You know, is that frowned upon by the school board? Is that illegal? Is that improper? Of course not. It's the same situation in this case." But here's the really troubling part: Payne had used the privacy settings on Facebook. She thought that only her closest friends could see her vacation photos or her use of the "B" word. "I wouldn't use it in a classroom, no," she said. "But Facebook is not the classroom. And it's not open to the students of my classroom. They are not supposed to see it. I have privacy in place so they don't see it." Privacy? What Ashley Payne or anyone of us who uses the Internet has to realize is this: Today our private lives are no longe
Kelby W

Ethical Issues of Internet Privacy - 0 views

  •  
    Internet privacy is a major concern of today. Privacy over the internet has some issues, which need to be dealt with.  "Using the Internet often comprises the use of social networking sites, email facilities and the browse of various other websites. Internet privacy comes on the scene when it comes to website users giving out their personal details on the Internet. For certain websites, which facilitate online shopping, the users are made to input their credit card numbers. In case of emailing sites, there are issues about whether third parties should be allowed to store or read emails without informed consent. Whether or not, the third parties should be permitted to track the visitors on a website, is another major privacy concern. The other important Internet privacy issue is whether the sites that gather personally identifiable information from the users should store or share it. Internet privacy can be considered as a subset of computer privacy. Computer privacy consists of the data privacy relating to the avoidance of the improper disclosure of the personally identifiable information collected and stored by websites. The effective sharing of data while protecting the private information is the real challenge. One school of thought denies the existence of Internet privacy while the other advocates the necessity of the Internet privacy. Complete anonymity is not the intent of Internet privacy. It rather intends to achieve a controlled disclosure of one's personal information. Internet is a network of networks and when a person uses the Internet, he/she connects to it and is identified by an address. In technical terms this address is known as an IP address. For security reasons, a website may wish to track these addresses of its users. Websites may collect the non-personally identifiable information of their users. Such information is the one, which in no way can be used to uniquely identify a person. The disclosure of these forms of information is acceptable
Riley F.

digiteen2008 - Digital Health and Wellness - 2 views

  • Digital Health and Wellness is how to stay physically fit.
  • . A few months ago a train wrecked because the driver was texting and not paying attention to how fast he was going
  • I think that alot of middle aged students would be interested in playing the nintendo wii fit.
  • ...14 more annotations...
  • Just a bit of advice for the middle and high school students, put the phone on silent and leave it alone while you are driving because you can really get hurt!
  • Also you can still teach kids to sit correctly when your on a computer
  • So they are just naturally harder to teach than anyone else
  • one of the teachers said that walking into a room without computers was like walking into a desert.
  • This video is all about minor cases of what can and will happen if you text and drive.
  • Here are some pictures of some of the worse things that can happen.
  • Middle school and high school students are more likely to text and drive because they don't know all about the dangers of texting and driving
    • d l
       
      This is true. Texting and driveng is very dangerous.
  • A good saying for this is," I hear and I forget, I see and I remember, I do and I understand." Confucious.
    • d l
       
      I agree.
  • One is that they are more affected by predators
  • The second is WE have to keep them from getting too much computer consumption
  • Doctors say kids should only get 1 or 2 hours of "screen time" a day.
  • People of all ages are becoming more and more dependent on computers and mobile phones.
  • Digital health and wellness is about staying fit and healthy I think. People that spend to much on computers or use there mobile phones to much should cut down heaps.
  • A. Elementary Aged Students Don't let them stay on the computer for extended amounts of time, don't let them get on Myspace or Facebook, and when they are on the computer the parents should always be watching them no matter what. B. Middle / High School Aged Students The middle school students should be allowed a little more freedom but by the same token i don't think that they should be allowed to get on Myspace or Facebook. Those things will bring a lot more trouble than anything else. Do you think that the people on Myspace are looking for a good christian page or a page that has a lot of bad pictures on it? I don't have a Myspace or Facebook and truly I don't want one. C. Adults Adults should be allowed to do what they want. I mean really what can we do to stop them? Nothing!! We can try all that we want to but adults get more addicted and are harder to get out of that habit. Then again I think that the adults will be the best influence for the young kids and if they will try and spread the word for the kids they can do anything for them that they want to
  •  
    This is last years info about my topic.
  •  
    This is the page from last year.
  •  
    this states what digital health and wellness is and it gives an example of what the author means.
1 - 20 of 925 Next › Last »
Showing 20 items per page