Skip to main content

Home/ Digiteen/ Group items tagged communication

Rss Feed Group items tagged

Maggie H

iPredators: Cyberbullying to cyber-harassing troll cop from hell - 1 views

  • Newsletter Subscriptions Newsletter Archives White Papers Webcasts Podcasts This Week In Print IT Jobs Community Slideshows New Data Center Solution Centers Aruba Networks Bring Your Own Device (BYOD) Aerohive Enterprise Networking Solution Center BMC Control-M Workload Automation CA Technologies Executive Resource Center CA Technologies Transform Your IT Strategy Dell 12th Generation PowerEdge Servers Solution Center HP + Microsoft Data Management Appliances & Architectures Network World Accelerating the Cloud Challenge Network World Data Center Challenge 2012 Network World Next Generation Firewall Challenge Network World Wi-Fi Challenge Riverbed Accelerate Business Performance Solution Center Silver Peak's Virtual WAN Optimization Center View all Solution Centers // Network World #nww_header ul.top_nav li.dropdown ul { display:none; } #nww_header ul.top_nav li.dropdown_active ul { background:url("http://www.networkworld.com/includes/styles/r08/img/more-back.gif") repeat-x scroll left top black; cursor:pointer !important; border:1px solid black; position:absolute; margin-top:20px; display:block; width:150px; left:0; } #nww_header ul.top_nav li.dropdown span { background-position:right center; background-repeat:no-repeat; cursor:default !important; padding:0 0 0 6px; color:#000000; height:20px; width:37px; } #nww_header ul.top_nav li ul li { background:none repeat scroll 0 0 transparent; margin-left:0; padding:0; } #nww_header ul.top_nav li.dropdown_active ul li a { background:url("http://www.networkworld.com/includes/styles/r08/img/more-sep.gif") no-repeat scroll left bottom transparent; cursor:pointer !important; text-decoration:none; padding-bottom:5px; padding-left:10px; line-height:11px; padding-top:3px; color:#EEEEEE; display:block; width:130px; } #nww_header ul.top_nav li.dropdown_active ul li.noBackground a { background:none; } #nww_header ul.top_nav li.dropdown_active ul li a:hover { background:url("http://www.networkworld.com/includes/styles/r08/img/more-hi.gif") repeat-x scroll left bottom transparent; padding-right:10px; width:129px; } function isMoreHovering() { $("#morepopupcontainer").bind("mouseleave", function() { $("#morepopupcontainer").hide(); }); $("#morepopupcontainer").show(); } $(document).ready(function() { $('.dropdown').hover( function () { $(this).addClass("dropdown_active"); }, function () { $(this).removeClass("dropdown_active"); } ); }); News Blogs & Columns &lpos=Nav:Ut
  • Back to Microsoft SubnetPrivacy and Security FanaticMs. Smith -- Select Microsoft Subnet Blog --Author expert: Microsoft Expression Web 3Brian Egler's SQL Server StrategiesEssential SharePointManaging MicrosoftMicrosoft Explorer Microsoft InsightsMicrosoft, Google and cloud tech newsMostly MicrosoftPrivacy and Security FanaticRated Critical: A Microsoft Security BlogSecrets of Windows Back Office ServersSQL Marklar The Best Microsoft VideosThe Social EnterpriseWatch Your Assets Previous Article iPredators: Cyberbullying to cyber-harassing troll cop from hellOctober is pegged to raise awareness about cyberbullying, cybersecurity and domestic violence, but an iPredator can play a part in all three. While getting help from the authorities is not always easy, what about when the cyber-creep doing the harassing and trolling is a cop? By Ms. Smith on Wed, 10/24/12 - 12:24pm. window.fbAsyncInit = function() { FB.init({ appId : '147094931979429', //NWW appId channelUrl : '//www.networkworld.com/community/sites/all/modules/nwmisc/channel.html', status : true, // check login status cookie : true, // enable cookies to allow the server to access the session xfbml : true // parse XFBML }); FB.Event.subscribe('edge.create', function(response) { if(typeof(OPG.Tracking.omniture_tl) != 'undefined') OPG.Tracking.omniture_tl('Social Click Complete', 'default'); }); }; (function(d, s, id) { var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) return; js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/all.js#xfbml=1"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); 4 Comments Print document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); clas
  • When it comes to cyberbullying, there are thousands of articles online about the tragic suicide of 15-year-old Amanda Todd and how Anonymous may have unmasked the man who bullied her into sending pictures which he later posted online and sent to her friends. While the man responsible for tormenting the Canadian teenager was a creep and a bully, since an adult was involved then it technically wasn't cyberbullying, according to Stop cyberbullying.
  •  
    October is cybersecurity month and bullying prevention awareness month.
Maggie B

Nine Elements - 3 views

  • one has the opportunity to communicate and collaborate with anyone from anywhere and anytime. Unfortunately, many users have not been taught how to make appropriate decisions when faced with so many different digital communicatio
  • communicate with other people. In the 19th century, forms of communication were limited. In the 21st
  • Digital Citizenship
  • ...23 more annotations...
  • citizenship can be defined a
  • to create rules and policy, we must teach everyone to become responsible digital ci
  • ic standards of conduct or procedure. Technology users often see this area as one o
  • l uncomf
  • oral goods and services are surfacing such as pornography and gambling. Users need to learn about how to be effective consumers in a new digital economy. 
  • t economy is being done electronically. Legitimate and legal exchanges are occurring, but the buyer or seller need
  • n electronic society. All people should have fair access to technology no matter who they are.  Places or organizations with limited connectivity need to be addressed as well.  To become productive citizens, we need to be committed
  • norms of appropriate, responsible behavior with regard to technology use. 
  • 1.   Digital Access:   full electronic participation in society. Technology users need to be aware of and support electronic access for all to create a foundation for Digital Citizenship.
  • s the
  • We need to have virus protection, backups of data, and surge control of our equipment. As responsible citizens, we must protect our information from outside forces that might cause disruption or harm.
  • 2.   Digital Commerce:   electronic buying and selling of goods. Technology users need to understand that a large share of marke
  • 3.   Digital Communication:   electronic exchange of information.
  • One of the significant changes within the digital revolution is a person’s ability to
  • offer a wide variety of choices (e.g., e-mail, cellular phones, instant messaging).  The expanding digital communication options have changed everything because people are able to keep in constant communication with anyone else.
  • n options.
  • 4.   Digital Literacy:   process of teaching and learning about technology and the use of technology. While schools have made great progress in the area of technology infusion, much remains to be done. A renewed focus must be made on what technologies must be taught as well as how it should be used.
  • 5. Digital Etiquette:   electron
  • 9.   Digital Security (self-protection):   electronic precautions to guarantee safety.
  • Digital
  • Digital Law:   electronic responsibility for actions and deeds
  • Digital Rights & Responsibilities:   those freedoms extended to everyone in a digital world
  • Digital Health & Wellness:   physical and psychological well-being in a digital technology world.
  •  
    Most people make the wrong health decisions. When they make these decisions, they mess up their whole life. Online health is the same. If you mess up there, you mess up your life.
  • ...2 more comments...
  •  
    "Nine Themes of Digital Citizenship Digital citizenship can be defined as the norms of appropriate, responsible behavior with regard to technology use. 1. Digital Etiquette: electronic standards of conduct or procedure. Technology users often see this area as one of the most pressing problems when dealing with Digital Citizenship. We recognize inappropriate behavior when we see it, but before people use technology they do not learn digital etiquette (i.e., appropriate conduct). Many people feel uncomfortable talking to others about their digital etiquette. Often rules and regulations are created or the technology is simply banned to stop inappropriate use. It is not enough to create rules and policy, we must teach everyone to become responsible digital citizens in this new society. 2. Digital Communication: electronic exchange of information. One of the significant changes within the digital revolution is a person's ability to communicate with other people. In the 19th century, forms of communication were limited. In the 21st century, communication options have exploded to offer a wide variety of choices (e.g., e-mail, cellular phones, instant messaging). The expanding digital communication options have changed everything because people are able to keep in constant communication with anyone else. Now everyone has the opportunity to communicate and collaborate with anyone from anywhere and anytime. Unfortunately, many users have not been taught how to make appropriate decisions when faced with so many different digital communication options. 3. Digital Literacy: process of teaching and learning about technology and the use of technology. While schools have made great progress in the area of technology infusion, much remains to be done. A renewed focus must be made on what technologies must be taught as well as how it should be used. New technologies are finding their way into the work place that are not being used in schools (e.g., videoconfer
  •  
    9 elements to digital citizenship
  •  
    In order for students to be achieve digital citizenship, we must know how to communicate properly.
  •  
    Nine Themes of Digital Citizenship Digital citizenship can be defined as the norms of appropriate, responsible behavior with regard to technology use. 1. Digital Access: full electronic participation in society. Technology users need to be aware of and support electronic access for all to create a foundation for Digital Citizenship.
Dylon Smith

The Practice Of Effective Communication In Business Etiquette - College Essays - Tgstone - 0 views

  • The Practice of Effective Communication in Business Etiquette Including Nonverbal and Verbal Communication Timothy Stone # L22751253 Liberty University Abstract This essay discusses the importance of effective communication in business, and the attributes that help build or tear down the communication process.   This essay begins with discussing the role of non-verbal communication plays in presenting a professional image.   The essay goes on to describe in detail, different kinds of non-verbal communication.   Next the essay explains the limits of non-verbal communication, and compares the differences and notable contrasts between verbal and non-verbal communication.   The role of verbal communication is described, along with different ways that different kinds of verbal communication is interpreted.   Finally, this essay describes how verbal communication must be modified for different people, since difference groups will respond differently to the
Dru F

Avoiding Conflict Online - 0 views

  • Diverse opinions are critical to constructive dialog. Diversity enriches a group. But there is a line between constructive critical thinking and behavior which demeans individuals and potentially destroys communities. It is a fine line with no obvious answer for a facilitator. The goal of this piece is to think about how to support diverse and divergent thinking while reducing the likelihood of personal conflict and group destruction. And this conflict often arises due to misunderstanding. So it is about conflict beteen people, not between ideas. This is an important distinction!
  •  
    When talking back and forth via email, or instant messages one must be careful not to cross any lines that would make anyone misunderstand what was meant. "Diverse opinions are critical to constructive dialog. Diversity enriches a group. But there is a line between constructive critical thinking and behavior which demeans individuals and potentially destroys communities. It is a fine line with no obvious answer for a facilitator. The goal of this piece is to think about how to support diverse and divergent thinking while reducing the likelihood of personal conflict and group destruction. And this conflict often arises due to misunderstanding. So it is about conflict beteen people, not between ideas. This is an important distinction! Before we discuss how to avoid online conflict, there are five key attributes of online communication to take into consideration: Lack of physical communication cues - We cannot see or hear the huge range of non-verbal cues we use during the course of conversation to discern if our audience is understanding, agreeing, disagreeing, getting uncomfortable or opening up. In cyberspace, we must explicitly ask for this information. Potential impersonality of the medium (distance) - Sometimes, when communicating online people may lose some of their inhibitions and say things they would not say offline. Social norms are less clear and more open to individual interpretation. Setting norms that we agree to use together can control this loss of inhibition. Asynchronicity affects the way we experience and feel about messages - When you have time to think about your response, you may be more thoughtful or you may let issues build up and get blown out of proportion. In online interactions, each of us may interpret periods of silence very differently. These subtle, unspoken issues can cloud communication. Public vs. private spaces and perceptions - People have different tolerances of what they think should be "public" or "private." T
Riya P

IGI Global: Improving Cross-Cultural Awareness and Communication through Mobile Technol... - 0 views

  • Increasingly, technology is mediating the way in which the youth around the world communicate, consume content and create meaning. As mobile communication media and the internet become more pervasive, young people from different cultures and communities are afforded more opportunities for collaboration across previously unbridgeable distances.
  •  
    CULTURE This a article about how young children are communicationg with other cultures through technolgy. There is another link with the whole article...http://www.igi-global.com/viewtitlesample.aspx?id=52388 "Increasingly, technology is mediating the way in which the youth around the world communicate, consume content and create meaning. As mobile communication media and the internet become more pervasive, young people from different cultures and communities are afforded more opportunities for collaboration across previously unbridgeable distances."
Becca B

10 Etiquette Tips For An Online Course - 0 views

  • 1.) Participation — unlike classroom settings, you can’t just “show up” and expect to pass the class. An online class is a community, and as such all are expected to participate. Discussion posts, opinions and feedback should be thoughtful and well-articulated so that everyone can enjoy a fun learning experience. 2.) Procrastination — do not wait until the last minute to do your work! Taking an online course means working with technology, and sometimes it can fail you. Work ahead of schedule so that any problems can be taken directly to the instructor for help, without losing time. 3.) Sharing — ideas, opinions and experiences should be shared with the whole community. Classmates may post questions on the Discussion Board, which you may be able to answer. Don’t keep information to yourself; in a community, everyone works together for the good of the whole. 4.) Proofread – before you press the SEND button, think about what you have written; you can’t take it back! A response to a classmate, a discussion post, an email to the instructor, make sure that you have said what you meant and that you mean what you said! 5.) Express — classmates and teachers cannot “see you”, so you have to be clear. Sarcasm, concern and other emotions are lost in an online environment if there is not enough information to back the statement up. 6.) Feedback — give feedback to your classmates and be open to theirs. Online classes function best when everyone is involved in the learning process. 7.) Respect — do not put down anyone’s ideas or thoughts, also state your own opinion in a way that is not hostile or overwhelming. Respect your classmates and they will respect you! 8.) Caution – be careful about statements that may come off as derogatory, racist or inappropriate for the classroom setting. If you wouldn’t say it in person, don’t say it online. 9.) Cheating – treat the class like an in-room course. Do not cheat, it only hurts your learning opportunities. 10.) Work hard! — to get the most out of it, you’ve got to put your best into it! Work hard and achieve results!
  •  
    "1.) Participation - unlike classroom settings, you can't just "show up" and expect to pass the class. An online class is a community, and as such all are expected to participate. Discussion posts, opinions and feedback should be thoughtful and well-articulated so that everyone can enjoy a fun learning experience. 2.) Procrastination - do not wait until the last minute to do your work! Taking an online course means working with technology, and sometimes it can fail you. Work ahead of schedule so that any problems can be taken directly to the instructor for help, without losing time. 3.) Sharing - ideas, opinions and experiences should be shared with the whole community. Classmates may post questions on the Discussion Board, which you may be able to answer. Don't keep information to yourself; in a community, everyone works together for the good of the whole. 4.) Proofread - before you press the SEND button, think about what you have written; you can't take it back! A response to a classmate, a discussion post, an email to the instructor, make sure that you have said what you meant and that you mean what you said! 5.) Express - classmates and teachers cannot "see you", so you have to be clear. Sarcasm, concern and other emotions are lost in an online environment if there is not enough information to back the statement up. 6.) Feedback - give feedback to your classmates and be open to theirs. Online classes function best when everyone is involved in the learning process. 7.) Respect - do not put down anyone's ideas or thoughts, also state your own opinion in a way that is not hostile or overwhelming. Respect your classmates and they will respect you! 8.) Caution - be careful about statements that may come off as derogatory, racist or inappropriate for the classroom setting. If you wouldn't say it in person, don't say it online. 9.) Cheating - treat the class like an in-room course. Do not cheat, it only hurts your learning
Garrett E

Technology Concerns - 0 views

  • World Wide Web enables one to access volumes of information, earn graduate degrees on-line, submit mortgage applications, procure countless goods and services, and communicate instantaneously on a global basis. The increased use of technology in education is accompanied by concerns about technology's role in education.
  • One study by the Center for Applied Special Technology has shown that students with on-line access scored higher in the areas of information management, communication, and the presentation of ideas. According to one article the use of instructional technology offers great promise in helping "students become independent, critical thinkers, able to find information, organize and evaluate it, and then effectively express their new knowledge and ideas in compelling ways" (CAST, 2000).
  • In the CAST study the results revealed that students using on-line communication became more confident carrying out and presenting a research project over the course of the study.
  • ...1 more annotation...
  • The use of technology has also been beneficial for individuals with disabilities. I have personal knowledge of a young man with A.L.S. who slowly lost his ability to communicate verbally and used the computer as a communication tool. Later as the disease progressed he utilized additional technology which allowed him to use his eye movement as a type of input device.
  •  
    study showing that students with access scored higher in areas of information management, communication, and the presentation of ideas. "students become independent, critical thinkers, able to find information, organize and evaluate it, express knowledge and ideas in compelling ways" confidence young man with ALS and technology allowed him to communicate using the computer; later, used eye movement as a type of input device
Nolan C

Netiquette - Wikipedia, the free encyclopedia - 0 views

shared by Nolan C on 02 Oct 09 - Cached
  • Netiquette (a compound formed from "net etiquette") is a set of social conventions that facilitate interaction over networks, ranging from Usenet and mailing lists to blogs and forums. These rules were described in IETF RFC 1855.[1] However, like many Internet phenomena, the concept and its application remain in a state of flux, and vary from community to community. The points most strongly emphasized about USENET netiquette often include using simple electronic signatures, and avoiding multiposting, cross-posting, off-topic posting, hijacking a discussion thread, and other techniques used to minimize the effort required to read a post or a thread. Netiquette guidelines posted by IBM for employees utilizing Second Life in an official capacity, however, focus on basic professionalism, maintaining a tenable work environment, and protecting IBM's intellectual property.[2] Similarly, some Usenet guidelines call for use of unabbreviated English[3][4] while users of online chat protocols like IRC and instant messaging protocols like SMS often encourage just the opposite, bolstering use of SMS language.
  • Common rules for e-mail[7] and USENET such as avoiding flamewars and spam are constant across most mediums and communities. Another rule is to avoid typing in all caps, which is considered to be the equivalent of shouting or yelling. Other commonly shared points, such as remembering that one's posts are (or can easily be made) public, are generally intuitively understood by publishers of web pages and posters to USENET, although this rule is somewhat flexible depending on the environment. On more private protocols, however, such as email and SMS, some users take the privacy of their posts for granted. One-on-one communications, such as private messages on chat forums and direct SMSes, may be considered more private than other such protocols, but infamous breaches surround even these relatively private media. For example, Paris Hilton's Sidekick PDA was cracked in 2005, resulting in the publication of her private photos, SMS history, address book, etc.[8]
  •  
    Netiquette project
  • ...2 more comments...
  •  
    the definition of netiquette
  •  
    Wikipedia definition of Netiquette
  •  
    Netiquette (short for "network etiquette" or "Internet etiquette") is a set of social conventions that facilitate interaction over networks, ranging from Usenet and mailing lists to blogs and forums. These rules were described in IETF RFC 1855. However, like many Internet phenomena, the concept and its application remain in a state of flux, and vary from community to community.
  •  
    Netiquette (short for "network etiquette" or "Internet etiquette") is a set of social conventions that facilitate interaction over networks, ranging from Usenet and mailing lists to blogs and forums. These rules were described in IETF RFC 1855. However, like many Internet phenomena, the concept and its application remain in a state of flux, and vary from community to community.
Becca B

Online Etiquette - 1 views

  • However, some things don't change: the practices of courtesy and respect that apply in the ordinary classroom also apply online, and require even more attention
  • Participate
  • Be persistent
  • ...8 more annotations...
  • Share tips
  • Think before you push the Send button
  • Remember that we can't see the grin on your face when you make a sarcastic comment,
  • Ask for feedback
  • "Flaming,"
  • unacceptable
  • derogatory or inappropriate comments
  • Plagiarism
  •  
    " 1. Participate. In the online environment, it's not enough to show up! We need to hear your voice to feel your presence, and we especially need your comments to add to the information, the shared learning, and the sense of community in each class. 2. Be persistent. Remember that we're all working in a fairly new environment. If you run into any difficulties, don't wait! Send an email immediately to your instructor or post on the Bulletin Board. Most problems are easily solved, but your instructor (and your course colleagues) have to hear from you before they can help. 3. Share tips, helps, and questions. For many of us, taking online courses is a new frontier. There are no dumb questions, and even if you think your solution is obvious, please share it by posting it on the Bulletin Board or other communication tool. 4. Think before you push the Send button. Did you say just what you meant? How will the person on the other end read the words? While you can't anticipate all reactions, do read over what you've written before you send it. 5. Remember that we can't see the grin on your face when you make a sarcastic comment, we can't see the concern on your face if you only say a couple of words, and we can't read your mind and fill in the gaps if you abbreviate your comments. So: help us "see" you by explaining your ideas fully. 6. Ask for feedback if you're not sure how your ideas and comments will be taken. Remember there's a person on the other side. If you disagree with what someone has said, practice all your communication skills as you express that disagreement. 7. "Flaming," or flying off the handle and ranting at someone else is unacceptable; it's the equivalent of having a tantrum, something most of us wouldn't do in an onsite, face to face classroom. 8. Any derogatory or inappropriate comments regarding race, gender, age, religion, sexual orientation, are unacceptable and subject to the sa
wildcat wildcat

digiteen2008 - Digital Etiquette - 3 views

  • Good etiquette is shown by having a proper education, manners and a sense of tact.
  • Etiquette mainly appears when someone has guests, meets with other people, or during meals.
  • Etiquette: Key terms Etiquette: rules governing socially acceptable behavior. Propriety: correct or appropriate behavior. Manners: a polite or well bred social behavior or habits Proper: marked by suitability or rightness or appropriateness. Education: the activities of educating or instructing; activities that impart knowledge or skill. Respect: an attitude of admiration or esteem. Civilized: having a high state of culture and development both social and technological. Social: living together or enjoying life in communities or organized groups. Tact: the ability to speak without offending others. Polite: showing regard for others in manners, speech, behavior. Impression: mental picture: a clear and telling mental image. Cleanliness: the habit of keeping free of superficial imperfections, diligence in keeping clean. Sophisticated: having or appealing to those having worldly knowledge and refinement. Society: an extended social group having a distinctive cultural and economic organization.
  • ...14 more annotations...
  • Digital Etiquette 1. Here is some tips that you should follow when talking online, texting, or emailing: 2. Say Hello before you start talking. It’s polite and it can make somebody happy knowing that somebody is nice enough to say hello. 3. Try to avoid replying “Sure”. A person will go crazy trying to figure out “Sure” what? Also, depending on who you are talking to online, the person may know little of your language and might not understand what you are saying, so be patient. 4. Avoid trailing off. If you stop responding to somebody all of the sudden they might think you’re ignoring them. If you have to go and do something say “BRB” or “one sec”. It will calm any worries, which the person has, who you are communicating to. 5. Don’t post people’s photos without their permission. Somebody might have a religion where they're not allowed to have they're pictures online. 6. Accept differences. Everybody has different beliefs. Don’t make fun of somebody’s religion or country because people can really get offended about what you say. 7. Talk about things that are appropriate. Chat rooms are for anyone who wants to talk to new people. One inappropriate comment can ruin it for everyone. You should always be aware to whom you are talking to and if they ask you to do anything which you feel uncomfortable about then tell an adult immediately so then the problem won't get out of hands. 8. Say bye before you leave the person whether its in person or online. You could seriously hurt somebody’s feelings if you just stop talking to them. 9. Be careful the way you type something. What you write can sound very different than what you mean. Read your writing before you press send. It could save you from an embarrassing situation. 10. Avoid writing in all capital letters. It looks like you're shouting. Wouldn't you think I was shouting if you saw this, DON'T WRITE IN ALL CAPITAL LETTERS.
  • Access Communication Literacy Student Environment Security and Safety Etiquette Rights and Responsibilities Student Life Outside Commerce Law Health and Wellness Class Actions American School of Madrid Spain Anand Vidya Vihar India Aspengrove School Canada Badshah Faisal Islami Institute Bangladesh La Grange USA Pahartali Girls High School Bangladesh Rani Bilashmoni Govt. Boys High School Bangladesh Troy Middle School USA Qatar Academy Qatar Wedderburn College Australia Westwood Schools USA Information Social & Ethical Issues Rubrics Teachers Template sj32 · My Wikis · · My Account · Help · Sign Out · Digital Etiquette page Details and TagsPrint PDF Backlinks Source Delete Rename Redirect Permissions Lock discussion (39) history notify me Details last edit Friday, 12:46 pm by kcaise - 124 revisions Tags none Type a tag name. Press comma or enter to add another. Cancel Table of ContentsDigital Etiquette 1. Overview/Description of the various aspects of the topic. Elementary Aged Students Middle/ High School Aged Students Email Etiquette: BE A SPORT, AND KEEP IT SHORT: NON MIND READERS FRIENDLY, PLEASE!: graTipos and.grammar! can caus cauz ishueezz? (typos and grammar... can cause issues!) BUISNESS FOR BUSYNESS!!! BE PLASTIC-ON-THE-SCREEN-CLEAR!!! A
  • Digital Etiquette or netiquette is a basic set of rules you should follow to make the internet a better place for other people and yourself.
  • When you instant message, chat, or email someone over the internet, that person can't tell if your just joking because they can't see your face. Don't say stuff over the internet that can be taken the wrong way or can hurt someones feelings
  • The internet takes over some peoples lives and people can get brain washed so easily when on the computer. Hacking other computers, using bad language, downloading illegally, and plagiarism are examples of having bad or no etiquette when it comes to the internet.
  • Etiquette is a set of rules dealing with exterior form
  • Middle/ High School Aged Students Teenagers these days are only on the internet to chat with their friends they know, or to look at cool videos or pictures.Myspace and Facebook are easy ways for teenagers to get access to the internet. These two websites have caused a lot of controversies over the internet because some teenagers will put bad pictures on the internet of themselves or other people. Every once in a while fights will occur between people who are trying to make each other look bad. It gives them a bad reputation and it ruins friendships all over the world. I just think that if teenagers would act mature then a lot of these things would not happen.
  • Online plagiarism is where internet users copy or use part of your or someone else's work. It is definitely not acceptable and is becoming a major issue. People need to have the right to place information on the internet knowing that it will not be copied for other people's work. Plagiarism is illegal but people still don't get the message. Plagiarism really could start major problems like people not writing the truth on the internet or making up information just to teach people a lesson. If someone is going to copy other people's work really they are better off handing the work in late or not at all. Using people's ideas is okay if you give them recognition or asked them. Plagiarism is equal to lying, if not worse. People are being generous by putting their knowledge on the internet to help people not to do it for people. Have courtesy and respect- don't copy peoples work use it as a guide and acknowledge them for their work and help. Plagerism- it's illegal so do the right thing.
  • ownloading illegally is one of the things not do in digital etiquette. Using file sharing programs such as KaZaA, Bit Torrent, iMesh, and Lime Wire to share or obtain copyrighted music, movies, games, and other software without the permission of the copyright holder is illegal. Stealing music has lots of effects once done. Some of the effects are listed below. Stealing music is against the law. Stealing music betrays the songwriters and recording artists who create it. Stealing music stifles the careers of new artists and up-and-coming bands. Stealing music threatens the livelihood of the thousands of working people—from recording engineers to Christian music retailers and their staffs —who are employed in this ministry.
  • Downloading Illegally
  • Some ways on avoiding stealing music are: Read user agreements carefully. Check the Web sites of the musicians, record companies, or movie studios to see if they allow distribution of their materials on the Internet. When purchasing music, movies, games, software, or other materials, read the license carefully to learn if you have permission to convert materials to other formats for personal use. Don't share or distribute materials unless you have permission. Of course, there are consequences to this kind of action. For one you can be fined of at least $500 dollars. The online infringement of copyrighted music can be punished by up to 3 years in prison and $250,000 in fines," the website said. "Repeat offenders can be imprisoned up to 6 years. Individuals also may be held civilly liable, regardless of whether the activity is for profit, for actual damages or lost profits, or for statutory damages up to $150,000 per infringed copyright. " To avoid these kinds of consequences you must avoid downloading illegally. I suggest that you follow the ways on avoiding these sort of consequences.
  • Some people have had both positively and negatively affected by internet etiquette. An example of negative etiquette on the internet is like if a person copies somebody's work without their permission and then the person who got copied goes and deletes that person's work
  • Don't type in all caps it looks like you're shouting which can offend some people which are on the other end of the computer because when you are talking to a person in face its easier to get your point across than talking online. Also if you try to do humor on the computer someone might not know that it is humor, and might take it as personal and you can get in trouble in all sorts of ways. Another thing is don't send rude messages or offensive e-mails to one another. It bad manners and it can get way out of hand in no time. Although you might be a pro at cyberspace be nice to the new comers. For a new comer on computers it is like learning a different language for them. Computers take a lot of practice and it is also called for mistakes. So be nice to everyone you meet and also try to help them if you can.
  • Another example is if you do something very funny and one of your friends got you on video tape and he goes and posts it on YouTube
  •  
    What etiquettet is
  •  
    "Digital Etiquette or netiquette is a basic set of rules you should follow to make the internet a better place for other people and yourself"
Blakelee H

Positive Effects of the Internet - 0 views

  • Internet, as most of us know, is a large network of networks, which communicate with each other by means of data packets. Internet is regarded as the largest information base. Today, Internet has become an integral part of our daily lives. We depend on the Internet to update ourselves about current news and rely on the communication platform it offers to get in touch with our near ones. The information from all around the world is just a click away, thanks to the Internet. Internet has surely affected the society positively. With the onset of the Internet, access to information has become easy. Internet has served being an efficient and organized storage of information. Internet search engines are the best information retrieval systems that are functional over the Internet. Typing in a simple search query to a search engine fetches you thousands of search results. Moreover, the ranking strategies adopted by the search engines ensure that the most relevant results are delivered to you on priority. The search engines crawl over all the information that seems relevant to your search query. They retrieve the most relevant results in top order, thus helping you fetch the required information with great ease. Information is truly a click away! The Internet provides some of the most effective means of communication. Emails and instant messages have made online communication possible. Social networking and blogging websites and online discussion forums have proved being popular platforms of expression. People in different parts of the world can collaborate over the Internet. They can exchange views, share information and work together over the Internet. It was the development of the Internet that made online education and distance learning possible. Professionals working in physically distant locations can collaborate their efforts, thanks to the Internet.
  •  
    Internet can have positive results, such as easy access of information and communication
Steve Madsen

QUT | News | Lonely children disclose intimate information online - 0 views

  •  
    "The survey found lonely children and teenagers communicated online much more frequently about how they felt, serious problems and confidential topics. Lonely children and teenagers also reported communicating online in order to belong to a group and to relax - much more so than those who were not lonely. "Lonely kids found great company on the internet," Associate Professor Campbell said. She said the study found lonely children and teenagers viewed the internet as a "protected" environment in which they could better express their inner selves. "We also found that kids who were socially anxious felt they could be more themselves when communicating online," she said. "They were not as anxious in developing friendships because they were at that one remove.""
  •  
    Would lonely people be more likely to become 'addicted' to the Internet?
Taylor B

Online Classroom: Netiquette - 0 views

  • This refers to your efforts to create a sense of online community. Positive climate building can reduce anxiety about communicating online, and contribute to a positive collegial environment. Climate building can be developed by:  Use of first names by participants.  Responding promptly to messages sent to you.  Use of reinforcement phrases (i.e., "Good idea!" or "Thanks for the suggestions," etc.).  Use of personalizing remarks (i.e., a reference to where you are working -- home, office, terminal, what is happening around you, the weather, etc.). Avoiding hostile or curt comments. No objectionable, sexist, or racist language will be tolerated.  Displaying humour.  Promoting cooperation by offering assistance and support to other participants and by sharing ideas.  Beyond Netiquette: Dos and Don'ts   Demonstrating courtesy online is fundamental. (Absolutely no abusive or libelous comments will be permitted.)  Use only your real first and last name online.  Confidentiality: No one else should be given access to any of the conferences (either viewing onscreen or in print), without the previous consent of all participants and conferees.  Copyright & Plagiarism: Don't use the words or text of others without proper acknowledgement of the source (if this was in some public source), or -- if private (as in a conference) unless you first have the author's permission.  The use of humor can be very tricky; sometimes it is seen as sarcasm or derision rather than as funny. Symbols or parenthetic phrases (e.g., :-) or "ha! ha!") can help to convey emotional tone and help to prevent misunderstandings.
  •  
    "Netiquette," or network etiquette, refers to the evolving rules for considerate behaviour on the networks. These guidelines are often posted at the beginning of an online course, or perhaps in the "cafe" or "student center" where all students mingle. Netiquette and Group Dynamics This refers to your efforts to create a sense of online community. Positive climate building can reduce anxiety about communicating online, and contribute to a positive collegial environment. Climate building can be developed by: * Use of first names by participants. * Responding promptly to messages sent to you. * Use of reinforcement phrases (i.e., "Good idea!" or "Thanks for the suggestions," etc.). * Use of personalizing remarks (i.e., a reference to where you are working -- home, office, terminal, what is happening around you, the weather, etc.). * Avoiding hostile or curt comments. No objectionable, sexist, or racist language will be tolerated. * Displaying humour. * Promoting cooperation by offering assistance and support to other participants and by sharing ideas. Beyond Netiquette: Dos and Don'ts * Demonstrating courtesy online is fundamental. (Absolutely no abusive or libelous comments will be permitted.) * Use only your real first and last name online. * Confidentiality: No one else should be given access to any of the conferences (either viewing onscreen or in print), without the previous consent of all participants and conferees. * Copyright & Plagiarism: Don't use the words or text of others without proper acknowledgement of the source (if this was in some public source), or -- if private (as in a conference) unless you first have the author's permission. * The use of humor can be very tricky; sometimes it is seen as sarcasm or derision rather than as funny. Symbols or parenthetic phrases (e.g., :-) or "ha! ha!") can help to convey emotional tone and help to prevent misunderstandings."
  •  
    This is to help people to create a sense of an online community. We want it to be a positive climate on the internet.
anonymous

scanR :: Scan, copy, and fax with your camera phone - 0 views

  • What is scanR? Try scanR! Subscribe! It’s like having a digital scanner in your pocket! Trying scanR is free, easy, and takes just a few minutes. Get started scanning documents, whiteboards, and business cards!
    • anonymous
       
      innovation of communication, how we can transfer data through our communication methods, weather that be through online, or by our phones
  •  
    innovation of communication, how we can transfer data through our communication methods, weather that be through online, or by our phones.
anonymous

Computers are the 'type' of communication seniors want | NBS.gmnews.com | North South ... - 2 views

  •  
    Kids and teenagers these days are so technologically advanced, they are able to help teach seniors to use the basic communications online like logging into the computers, and setting up email accounts to be able to communicate with other people easier.
Brody C

Safety and Security on the Internet - 0 views

  • Why Should I Worry About Security? The Internet is a global collection of Interconnected Networks that facilitate information exchange and computer connectivity. The Internet is comprised of many different computers, all of which fall into two categories: servers (also known as "hosts") and clients (also known as "guests") -- technically, everything on the Internet can be considered a "host," but for this discussion, we'll use "hosts" and "guests." Guest machines send bursts of computer data called "packets" which are analyzed by the server belonging to the guest's Internet service provider. If the data is located locally (on the ISP's machine), the ISP's server will return the packets. If the information sought is not local (on another machine), the ISP's server hands off the packets to a router, which then sends the packets to the server containing the information. Once the information is located, it is sent back to the guest machine. There are many different types of computers that fill these two categories: mainframes, minicomputers, PCs, Macintosh, Unix and others. Despite the many varieties of computers that combine to form the Internet, every computer connected to the Internet needs to be able to communicate with every other computer -- without this ability, there is no Internet. All of these computers are able to communicate because in a sense they can all speak the same language -- TCP/IP. TCP/IP actually isn't a language; it is in computer terms what is known as a "protocol." A protocol is simply a standard for transmitting and receiving bits of information. As long as all of the interconnected computers follow the same protocol, they can exchange information. Unfortunately, when data is sent from one computer to another on the Internet, every other computer in between has an opportunity to see what's being sent. This poses an obvious security problem.
  • Say you decide to purchase concert tickets on the Web. To do so, you need to fill out an electronic form with your name, address and credit card number. When you submit the form, your information passes from computer to computer on its way to the concert ticket web server. It is possible that someone could be watching the data passing through one of the computers that is in between your computer and the concert ticket server. No one knows how often this happens, but everyone concedes it is technically possible. And its also possible off the web, too -- E-mail can be captured (and read, if not encrypted), as can file transfers via unsecure FTP. If someone wanted to, it wouldn't be too difficult to connect a capture device to someone's phone line (assuming they use a modem to connect to the Internet) and steal an electronic copy of the data exchanged on the Internet. Even if you make your purchase on a secure web site supporting the latest security features, it has been recently shown that secure sites can cause Internet Explorer (and other browsers) to send sensitive information to a non-secure server in plain text format.
  • The point is, there are a lot of security issues related to a network such as the Internet. No FAQ could possibly cover them all. That is why this FAQ concentrates on Internet Explorer. Because there are millions of people who use Microsoft Windows family products, and because those millions have the ability to blend Internet Explorer with these products, the seriousness about security should be of paramount importance to everyone. Remember,  software products are only as secure as the environment in which they operate.
  • ...2 more annotations...
  • What Security Features does Internet Explorer Have? Internet Explorer is a safe browser in many ways. The latest version of IE supports Secure Socket Layer (SSL) 2.0/3.0, Private Communication Technology (PCT) 1.0, CryptoAPI, and VeriSign certificates, and one version employs 128-bit encryption, one of the strongest forms of encryption that's commercially available for use over the Internet. To see if you have the 128-bit version of Internet Explorer, go to the Wells Fargo Bank site and take their browser test. "Secure Socket Layer (SSL) is a Netscape-developed protocol submitted to the W3C working group on security for consideration as a standard security approach for World Wide Web browsers and servers on the Internet. SSL provides a security "handshake" that is used to initiate the TCP/IP connection. This handshake results in the client and server agreeing on the level of security they will use and fulfills any authentication requirements for the connection. Thereafter, SSL's only role is to encrypt and decrypt the byte stream of the application protocol being used (for example, HTTP). This means that all the information in both the HTTP request and the HTTP response are fully encrypted, including the URL the client is requesting, any submitted form contents (such as credit card numbers), any HTTP access authorization information (usernames and passwords), and all the data returned from the server to the client." -- Microsoft's IIS 1.0 Features Tour. It has been reported, however, that SSL has been cracked. Private Communication Technology (PCT) is a Microsoft-developed security protocol available in IE only. According to their Internet draft, "The Private Communication Technology (PCT) protocol is designed to provide privacy between two communicating applications (a client and a server), and to authenticate the server and (optionally) the client. PCT assumes a reliable transport protocol (e.g., TCP) for data transmission and reception. The PCT protocol is application protocol-independent. A "higher level" application protocol (e.g., HTTP, FTP, TELNET, etc.) can layer on top of the PCT protocol transparently. The PCT protocol begins with a handshake phase that negotiates an encryption algorithm and (symmetric) session key as well as authenticating a server to the client (and, optionally, vice versa), based on certified asymmetric public keys. Once transmission of application protocol data begins, all data is encrypted using the session key negotiated during the handshake." IE also supports server and client authentication by using digital certificates to identify users to web servers. In addition, IE supports code signing with Authenticode, which verifies that downloaded code has not been modified. For more information on Authenticode, visit Microsoft's Authenticode page or the excellent Authenticode FAQ page. CryptoAPI 1.0 provides the underlying security services for the Microsoft Internet Security Framework. CryptoAPI allows developers to integrate cryptography into their applications. Microsoft has given a great deal of thought to the issue of security and it products, and Internet Explorer 4.0 is no exception. From "Security Zones" to continued support and refinement of Authenticode, IE4 promises to be one of the safest browsers of all time.  You can read all about the security available in IE 4 at http://www.microsoft.com/ie/ie40/?/ie/ie40/features/ie-security.htm. Also, check out what Microsoft is doing to keep transactions private with IE 4.
  • What are "Cookies?" Cookies are small text files that are sent to web browsers by web servers.  The main purpose of cookie files are to identify users and to present customized information based on personal preferences.  Cookie files typically contain information such as your name (or username), password information, or ad-tracking information.  There is a good body of literature on  the Internet about cookies.  Despite what you may have read or heard, most people, including myself, do not view cookies as any kind of a security threat.  However, because of the way cookies work (e.g., a web server storing a text file on someone's hard drive), Microsoft (and other browser manufacturers) have built options into their browsers that notify users when cookies are being passed to them, and give the user an option to prevent the cookie from being accepted.  I don't think this is a good idea.  By rejecting cookies, your browser may not display the entire page or the site may not function as intended. The reality is that cookies are text files -- they cannot contain viruses or execute applications, they cannot search your hard drive for information or send it to web servers, and most of the information they contain is simple tracking information designed to effect better customer service.
  •  
    safe things to do on the Internet and what to learn that is big
hannah h

Internet Collaboration: Good, Bad, and Downright Ugly - 0 views

  • Tips for Effective Internet Collaboration
  • in order to make the most of an often bad situation, I offer eight tips for effective Internet collaboration. These tips were developed based on my experiences over the past
  • While
  • ...14 more annotations...
  • c communication re
  • I believe strongly that electroni
  • mains a poor substitute for face-to
  • -face communication, I also realize that some collaborative projects would n
  • t be practical without it. So,
  • ew years with groups that follow them and
  • th groups
  • with groups that don't.
  • 1. Appoint a single leader or a small group of leaders who are responsible for making sure everything runs smoothly. These leaders need not have any decision-making authority, but they should have administrative responsibilities such as: keeping debates on topic, setting and enforcing deadlines, maintaining the group mailing list, and keeping a group archive. They should also be willing to serve as a resource and answer questions from group members so that these questions need not clog the mailing list. These leaders must be diligent about carrying out their responsibilities and should seek assistance should they find themselves over burdened. 2. Establish a no flame policy for your group. Flame wars are destructive to just about any collaborative effort. Group leaders should make a point of not involving themselves in flame wars, even if they are the target of a flame. They should also gently remind other group members of the policy. Some groups may wish to give a leader the authority to remove group members who repeatedly engage in flame wars. 3. Establish a policy of open communication between all group members. Members should keep everyone informed of the progress they have made i
  • n carrying out their responsibilities. If someone is havin
  • Establish
  • trouble completing a task they volunteered to do (due to lack of time, lack of expertise, or any other reason), they should inform other group members. If some group members communicate privately about a group matter, they should inform the rest of the group about the outcome of their discussion (being careful to say ``we recommend'' rather than ``we decided'' unless the group has given them the authority to make the decision). It is especially important for anyone in a leadership position to communicate with other members and make sure that the members are communicating with each other. 4. Establish a mission statement and set of operating procedures for your group. Depending on the size of your group and the duration of your project, this may be a short list of ground rules or a formal constitution. You should have guidelines and rules that cover the responsibilities of the leaders, the responsibilities of members, procedures for making decisions (including what to do in the event of a deadlock), procedures for appointing and expelling group members or leaders, and procedures for changing these rules. When working on a long-term, open ended project it is best to keep the ground rules somewhat flexible so that unanticipated ideas are not precluded and new group members don't feel stifled by a framework established by members long-retired. 5. Whenever a new and likely controversial topic is introduced to the group, have people respond to the original poster rather than to the entire mailing list. Then have the original poster collect all the responses into a single message (and if possible prepare an executive summary) and send that back to the group. You may want to repeat this for several rounds of discussion before opening the topic up for general debate. The idea here is to put all the issues on the table at once so that people don't start a debate before they have all the facts and a general understanding of the concerns of other group members. 6. Hold periodic virtual meetings. This can be done through a conference call, audio or video online conferencing software, an online chat room, or even an agreement that everyone will be online and checking their email at a specified time. Any of these formats should allow for a more or less synchronous debate followed, if necessary, by a vote. 7. If your group has trouble making decisions and is unable to get group members together for a virtual meeting frequently enough, try resorting to an electronic equivalent of Roberts Rules of Order in which the rules of debate are spelled out in great detail. (The nice thing about Robert's Rules is that they have been well established and thus groups can agree to adopt them without arguing over what they should be. Adopting a set of electronic rules for debate may be tricky if your group has to write these rules from scratch. But you may be able to get your group members to agree t
  • o adopt a set of rules written by
  • subcommittee or a neutral party.) Such rules might include the maximum amount of time allowed for a debate before a vote must be taken, the amount of time members have to submit their votes, and the maximum number of words or separate email messages a member may send to the mailing list on a particular topic. I see this mostly as a method of last resort, and I don't recommend writing this into the group's constitution or ground rules unless you've tried it and found it to be effective. 8. Try to find ways for as many of your group members as possible to meet in person. Ideally you would fly everyone to a central location for a group retreat. But financial concerns often don't allow for such luxuries, so do the best you can. Encourage group members to visit their geographically closest neighbors in the group and to meet other members at conferences or when traveling. The more group members get to know each other, the easier collaboration will be. If possible, try to get the entire group together at the beginning of the project and at the end of the project (or for a lengthy project, after every major phase of the project has been completed). Getting the entire group together at the beginning will help the group establish a common sense of direction. Meeting at the end or after the completion of a major phase will provide a sense of closure and an opportunity for group members to evaluate what they have done.
  •  
    This is some collaboration tips.
Riya P

Effects of Technology on Culture - 0 views

  • Technology has had an outstanding effect on modern society and culture.  It provides us with tools that enhance our ability to network through internet communities which includes anything from online gaming to applications such as Facebook or Twitter.  Internet communities promote freedom of expression that may not be as feasible in real life.  Real life, inevitably, contains many stereotypes and whether we believe in them or not, they are still in existence subconsciously
  •  
    Cultrual! This is a really long article about how cultures overlap. "Technology has had an outstanding effect on modern society and culture. It provides us with tools that enhance our ability to network through internet communities which includes anything from online gaming to applications such as Facebook or Twitter. Internet communities promote freedom of expression that may not be as feasible in real life. Real life, inevitably, contains many stereotypes and whether we believe in them or not, they are still in existence subconsciously"
Molly S

Global Competence Definition | Asia Society - 0 views

  • What is Global Competence? Help us better define global competence. Send in your students' work. Be a part of a ground-breaking effort to assess student global competence. We are collecting samples of work that demonstrate student global knowledge and skills at various developmental levels. Once the work is published, it will help teachers strengthen instruction and better evaluate student work and provide examples for students to help them strive for greater achievement. With each submission, you will be entered into a regular drawing for $500 Staples gift certificates. Learn more and get involved (PDF download). A globally competent student can Investigate the World Recognize Perspectives Communicate Ideas Take Action Students investigate the world beyond their immediate environment. Students recognize their own and others’ perspective. Students communicate their ideas effectively with diverse audiences. Students translate their ideas and findings into appropriate actions to improve conditions. Students can: Generate and explain the significance of locally, regionally or globally focused researchable questions. Identify, collect and analyze the knowledge and evidence required to answer questions using a variety of international sources, media and languages. Weigh, integrate and synthesize evidence collected to construct coherent responses that is appropriate to the context of issues or problems. Develop an argument based on compelling evidence that considers multiple perspectives and draws defensible conclusions. Students can: Recognize and articulate one’s own perspective on situations, events, issues or phenomena and identify the influences on that perspective. Articulate and explain perspectives of other people, groups or schools of thought and identify the influences on those perspectives. Explain how the interaction of ideas across cultures influences the development of knowledge and situations, events, issues or phenomena. Articulate how the consequences of differential access to knowledge, technology and resources affect the quality of life and influences perspectives. Students can: Recognize that diverse audiences may perceive different meanings from the same information. Use appropriate language, behavior and strategies to effectively communicate, both verbally and non-verbally, with diverse audiences. Explain how effective communication impacts understanding and collaboration in an interdependent world. Select and effectively use appropriate technology and media to communicate with diverse audiences. Students can: Recognize one’s capacity to advocate for and contribute to improvement locally, regionally, or globally. Identify opportunities for personal and collaborative action to address situations, events, issues or phenomena in ways which can make a difference. Assess options for action based on evidence and the potential for impact, taking into account varied perspectives and potential consequences for others. Act creatively and innovatively to contribute to improvement locally, regionally or globally both personally and collaboratively.
mitch g

digiteen2008 - Digital Communication - 1 views

  • Communication is the continuous process of giving and taking information between messenger and receiver
  • directly talking with others using language, body language, etc
  • confuse the receiver
  • ...13 more annotations...
  • body language
  • only simple things
  • face to face
  • trustful information
  • limited
  • to talk face to face
  • receiver and messenger have to stay in the
  • same place
  • have to use the same languag
  • most popular
  • using Internet
  • positive and negative
  • effects
  •  
    2008 communication wiki
1 - 20 of 154 Next › Last »
Showing 20 items per page