Skip to main content

Home/ Digiteen/ Group items tagged completeness

Rss Feed Group items tagged

Alan K

Legal governance, risk management, and compliance - Wikipedia, the free encyclopedia - 1 views

  •  
    Legal Compliance is talked about in this article. It has two subsections, Legal Consistency and Legal Completeness. There are processes, rules, tools, and systems when it comes to Legal Compliance.
  •  
    This really helped me do my part of the wiki. Very good choice =D.
hannah h

Internet Collaboration: Good, Bad, and Downright Ugly - 0 views

  • Tips for Effective Internet Collaboration
  • in order to make the most of an often bad situation, I offer eight tips for effective Internet collaboration. These tips were developed based on my experiences over the past
  • While
  • ...14 more annotations...
  • c communication re
  • I believe strongly that electroni
  • mains a poor substitute for face-to
  • -face communication, I also realize that some collaborative projects would n
  • t be practical without it. So,
  • ew years with groups that follow them and
  • th groups
  • with groups that don't.
  • 1. Appoint a single leader or a small group of leaders who are responsible for making sure everything runs smoothly. These leaders need not have any decision-making authority, but they should have administrative responsibilities such as: keeping debates on topic, setting and enforcing deadlines, maintaining the group mailing list, and keeping a group archive. They should also be willing to serve as a resource and answer questions from group members so that these questions need not clog the mailing list. These leaders must be diligent about carrying out their responsibilities and should seek assistance should they find themselves over burdened. 2. Establish a no flame policy for your group. Flame wars are destructive to just about any collaborative effort. Group leaders should make a point of not involving themselves in flame wars, even if they are the target of a flame. They should also gently remind other group members of the policy. Some groups may wish to give a leader the authority to remove group members who repeatedly engage in flame wars. 3. Establish a policy of open communication between all group members. Members should keep everyone informed of the progress they have made i
  • n carrying out their responsibilities. If someone is havin
  • Establish
  • trouble completing a task they volunteered to do (due to lack of time, lack of expertise, or any other reason), they should inform other group members. If some group members communicate privately about a group matter, they should inform the rest of the group about the outcome of their discussion (being careful to say ``we recommend'' rather than ``we decided'' unless the group has given them the authority to make the decision). It is especially important for anyone in a leadership position to communicate with other members and make sure that the members are communicating with each other. 4. Establish a mission statement and set of operating procedures for your group. Depending on the size of your group and the duration of your project, this may be a short list of ground rules or a formal constitution. You should have guidelines and rules that cover the responsibilities of the leaders, the responsibilities of members, procedures for making decisions (including what to do in the event of a deadlock), procedures for appointing and expelling group members or leaders, and procedures for changing these rules. When working on a long-term, open ended project it is best to keep the ground rules somewhat flexible so that unanticipated ideas are not precluded and new group members don't feel stifled by a framework established by members long-retired. 5. Whenever a new and likely controversial topic is introduced to the group, have people respond to the original poster rather than to the entire mailing list. Then have the original poster collect all the responses into a single message (and if possible prepare an executive summary) and send that back to the group. You may want to repeat this for several rounds of discussion before opening the topic up for general debate. The idea here is to put all the issues on the table at once so that people don't start a debate before they have all the facts and a general understanding of the concerns of other group members. 6. Hold periodic virtual meetings. This can be done through a conference call, audio or video online conferencing software, an online chat room, or even an agreement that everyone will be online and checking their email at a specified time. Any of these formats should allow for a more or less synchronous debate followed, if necessary, by a vote. 7. If your group has trouble making decisions and is unable to get group members together for a virtual meeting frequently enough, try resorting to an electronic equivalent of Roberts Rules of Order in which the rules of debate are spelled out in great detail. (The nice thing about Robert's Rules is that they have been well established and thus groups can agree to adopt them without arguing over what they should be. Adopting a set of electronic rules for debate may be tricky if your group has to write these rules from scratch. But you may be able to get your group members to agree t
  • o adopt a set of rules written by
  • subcommittee or a neutral party.) Such rules might include the maximum amount of time allowed for a debate before a vote must be taken, the amount of time members have to submit their votes, and the maximum number of words or separate email messages a member may send to the mailing list on a particular topic. I see this mostly as a method of last resort, and I don't recommend writing this into the group's constitution or ground rules unless you've tried it and found it to be effective. 8. Try to find ways for as many of your group members as possible to meet in person. Ideally you would fly everyone to a central location for a group retreat. But financial concerns often don't allow for such luxuries, so do the best you can. Encourage group members to visit their geographically closest neighbors in the group and to meet other members at conferences or when traveling. The more group members get to know each other, the easier collaboration will be. If possible, try to get the entire group together at the beginning of the project and at the end of the project (or for a lengthy project, after every major phase of the project has been completed). Getting the entire group together at the beginning will help the group establish a common sense of direction. Meeting at the end or after the completion of a major phase will provide a sense of closure and an opportunity for group members to evaluate what they have done.
  •  
    This is some collaboration tips.
Riya P

How technology affects rascism - 0 views

  • “On the Internet, nobody knows you’re a dog.”
  • Ms. Nakamura said she has been more surprised by completely new kinds of racism on some popular online video games that now count players around the world.
  • Many of the players chose to play as a female dwarf, a class in the game that can more easily win treasure on solo missions
  • ...1 more annotation...
  • “Race doesn’t happen because of biology—it happens because of culture,” she concluded.
  •  
    RASCISM Video games and computers also affect rascism. This article talks about that. "Race doesn't happen because of biology-it happens because of culture," she concluded Many of the players chose to play as a female dwarf, a class in the game that can more easily win treasure on solo missions. "Ms. Nakamura said she has been more surprised by completely new kinds of racism on some popular online video games that now count players around the world" "On the Internet, nobody knows you're a dog."
Brandon B

Teen Safety on the Internet - 0 views

  • Teen Safety on the Internet More and more teenagers are logging on to the Internet every day. Although the Internet is a great source for research projects and other information, there are also dangers involved with surfing the Web. For example, a study conducted in 2000 found that 25 percent of kids 10 to 17 years of age received unwanted pornographic material.The Web allows you to be completely anonymous. Someone who says that he is a 15-year-old boy may actually be a 50-year-old man pretending to be a teen for inappropriate reasons. As a result, agreeing to meet in person with someone you met over the Internet is extremely dangerous, as this can result in sexual assault or even murder. How to Stay Safe on the Internet E-mail Safety Chat Rooms Assessing a Web Site Blogging How to Stay Safe on the Internet Never give out personal information, such as your name, home address or phone number, the name of your school, pictures, credit card numbers or the names of your parents without permission from your parents.Do not meet in person with someone you met online. Do not give out your password to anyone.In chat rooms, use a name that is not gender-specific so you are less likely to receive pornographic material or other forms of harassment. If you do receive pornographic material, report it to your local police department. Back to top E-mail Safety
  • Do not open links or files from people you do not know.Never respond to e-mails with pornographic or other inappropriate material.Do not respond to advertisements -- this confirms that you have a working e-mail account, and you will only receive more junk e-mail.
  •  
    This page talks to teens about how to be safe on the internet. On e man pretended to be a 15 year when he was really 50. Some people are out there that are actually trying to talk and harm teens so be careful. Quote:"The Web allows you to be completely anonymous. Someone who says that he is a 15-year-old boy may actually be a 50-year-old man pretending to be a teen for inappropriate reasons. "
Matthew T

Virtual world, online world to play, chat and flirt in 3D | Smeet - 0 views

  •  
    This is an example of a virtual world. "Show off your creativity by building and decorating your avatar world, a full 3D Home that expands as you play! You can also meet new people in public hangout spaces, attend live events within Smeet, try out items brought to you by our partnerships with popular artists and brands and complete fun tasks. In order to make Smeet a personalized and user-friendly experience, we also offer a special virtual world for teens where they can interact with other users their own age and chat about everything from Pop stars, music and movies to teachers, classes, and homework. The virtual world for adults allows users the opportunity to show off the latest Smeet styles, playfully meet and flirt with new people, and create an exciting online life."
Matthew T

Popular virtual worlds for tweens and teens - 0 views

  •  
    This is some more of the virtual worlds teens are on. "Virtual worlds for teens Kids don't outgrow virtual worlds when they hit their teenage years. Many virtual worlds are geared toward the teenage set and they are gaining popularity every day. Meez - With over 80 casual games and multimedia sharing, Meez is a great site for teens. Avatars can navigate different neighborhoods, interact with friends, leave messages and watch videos. Teens can customize avatars that can be exported to other social networks and gaming sites. RuneScape - The RuneScape world is a medieval fantasy realm where players travel through different kingdoms and cities. Users create customizable avatars, fight monsters, complete quests, play games, chat and trade with others, and much more. Both free and premium memberships are available. IMVU - Intended for the teen crowd, IMVU boasts over 100 million users in 88 different countries and has a virtual goods catalog of over 10 million items. Users can search for people based on gender, location and age or join groups based on interests or personal opinions. SuperSecret - In SuperSecret, players start at age 10 and grow up to age 18 by achieving things in a variety of games. As users get older within the games, they get more privileges - at 16 they can drive a virtual car, at 18 they can vote, etc."
Maggie H

iPredators: Cyberbullying to cyber-harassing troll cop from hell - 1 views

  • Newsletter Subscriptions Newsletter Archives White Papers Webcasts Podcasts This Week In Print IT Jobs Community Slideshows New Data Center Solution Centers Aruba Networks Bring Your Own Device (BYOD) Aerohive Enterprise Networking Solution Center BMC Control-M Workload Automation CA Technologies Executive Resource Center CA Technologies Transform Your IT Strategy Dell 12th Generation PowerEdge Servers Solution Center HP + Microsoft Data Management Appliances & Architectures Network World Accelerating the Cloud Challenge Network World Data Center Challenge 2012 Network World Next Generation Firewall Challenge Network World Wi-Fi Challenge Riverbed Accelerate Business Performance Solution Center Silver Peak's Virtual WAN Optimization Center View all Solution Centers // Network World #nww_header ul.top_nav li.dropdown ul { display:none; } #nww_header ul.top_nav li.dropdown_active ul { background:url("http://www.networkworld.com/includes/styles/r08/img/more-back.gif") repeat-x scroll left top black; cursor:pointer !important; border:1px solid black; position:absolute; margin-top:20px; display:block; width:150px; left:0; } #nww_header ul.top_nav li.dropdown span { background-position:right center; background-repeat:no-repeat; cursor:default !important; padding:0 0 0 6px; color:#000000; height:20px; width:37px; } #nww_header ul.top_nav li ul li { background:none repeat scroll 0 0 transparent; margin-left:0; padding:0; } #nww_header ul.top_nav li.dropdown_active ul li a { background:url("http://www.networkworld.com/includes/styles/r08/img/more-sep.gif") no-repeat scroll left bottom transparent; cursor:pointer !important; text-decoration:none; padding-bottom:5px; padding-left:10px; line-height:11px; padding-top:3px; color:#EEEEEE; display:block; width:130px; } #nww_header ul.top_nav li.dropdown_active ul li.noBackground a { background:none; } #nww_header ul.top_nav li.dropdown_active ul li a:hover { background:url("http://www.networkworld.com/includes/styles/r08/img/more-hi.gif") repeat-x scroll left bottom transparent; padding-right:10px; width:129px; } function isMoreHovering() { $("#morepopupcontainer").bind("mouseleave", function() { $("#morepopupcontainer").hide(); }); $("#morepopupcontainer").show(); } $(document).ready(function() { $('.dropdown').hover( function () { $(this).addClass("dropdown_active"); }, function () { $(this).removeClass("dropdown_active"); } ); }); News Blogs & Columns &lpos=Nav:Ut
  • Back to Microsoft SubnetPrivacy and Security FanaticMs. Smith -- Select Microsoft Subnet Blog --Author expert: Microsoft Expression Web 3Brian Egler's SQL Server StrategiesEssential SharePointManaging MicrosoftMicrosoft Explorer Microsoft InsightsMicrosoft, Google and cloud tech newsMostly MicrosoftPrivacy and Security FanaticRated Critical: A Microsoft Security BlogSecrets of Windows Back Office ServersSQL Marklar The Best Microsoft VideosThe Social EnterpriseWatch Your Assets Previous Article iPredators: Cyberbullying to cyber-harassing troll cop from hellOctober is pegged to raise awareness about cyberbullying, cybersecurity and domestic violence, but an iPredator can play a part in all three. While getting help from the authorities is not always easy, what about when the cyber-creep doing the harassing and trolling is a cop? By Ms. Smith on Wed, 10/24/12 - 12:24pm. window.fbAsyncInit = function() { FB.init({ appId : '147094931979429', //NWW appId channelUrl : '//www.networkworld.com/community/sites/all/modules/nwmisc/channel.html', status : true, // check login status cookie : true, // enable cookies to allow the server to access the session xfbml : true // parse XFBML }); FB.Event.subscribe('edge.create', function(response) { if(typeof(OPG.Tracking.omniture_tl) != 'undefined') OPG.Tracking.omniture_tl('Social Click Complete', 'default'); }); }; (function(d, s, id) { var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) return; js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/all.js#xfbml=1"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); 4 Comments Print document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); clas
  • When it comes to cyberbullying, there are thousands of articles online about the tragic suicide of 15-year-old Amanda Todd and how Anonymous may have unmasked the man who bullied her into sending pictures which he later posted online and sent to her friends. While the man responsible for tormenting the Canadian teenager was a creep and a bully, since an adult was involved then it technically wasn't cyberbullying, according to Stop cyberbullying.
  •  
    October is cybersecurity month and bullying prevention awareness month.
Jenna A

The Importance of Fluency - All Info About Reading - Promoting Literacy for All - 0 views

  •  
    " Reading fluency is a measure of how quickly, smoothly, and easily text is read. Fluency means that words are read quickly and accurately, with little or no stumbling. It allows complete comprehension because less effort is needed for decoding. More thought power is available for understanding the author's message. Fluent readers read with expression and follow the punctuation cues. They read in sensible phrases, with pauses in natural places. Fluent readers are able to read aloud without attracting attention to the reading process, and listeners get the sense that the reader has a good grasp of the author's intent. Many reading students fall short of fluency. They read well enough to get by, but not well enough to enjoy what they are doing. Struggling readers often have a very large gap between the level at which they read fluently and their grade placement level or the demands of their day-to-day life. Most find this very frustrating, and they will try to avoid reading tasks. "
  •  
    This tells you what reading fluency is and how kids fall short of it.
Kelby W

Ethical Issues of Internet Privacy - 0 views

  •  
    Internet privacy is a major concern of today. Privacy over the internet has some issues, which need to be dealt with.  "Using the Internet often comprises the use of social networking sites, email facilities and the browse of various other websites. Internet privacy comes on the scene when it comes to website users giving out their personal details on the Internet. For certain websites, which facilitate online shopping, the users are made to input their credit card numbers. In case of emailing sites, there are issues about whether third parties should be allowed to store or read emails without informed consent. Whether or not, the third parties should be permitted to track the visitors on a website, is another major privacy concern. The other important Internet privacy issue is whether the sites that gather personally identifiable information from the users should store or share it. Internet privacy can be considered as a subset of computer privacy. Computer privacy consists of the data privacy relating to the avoidance of the improper disclosure of the personally identifiable information collected and stored by websites. The effective sharing of data while protecting the private information is the real challenge. One school of thought denies the existence of Internet privacy while the other advocates the necessity of the Internet privacy. Complete anonymity is not the intent of Internet privacy. It rather intends to achieve a controlled disclosure of one's personal information. Internet is a network of networks and when a person uses the Internet, he/she connects to it and is identified by an address. In technical terms this address is known as an IP address. For security reasons, a website may wish to track these addresses of its users. Websites may collect the non-personally identifiable information of their users. Such information is the one, which in no way can be used to uniquely identify a person. The disclosure of these forms of information is acceptable
Zachary D

more effects of virtual worlds - 0 views

  •  
    people use it to fill a since of compliment that they don't have in the real world allows for people to have a relationship with complete strangers on the other side of the world may lead to a need of therapy
Vicki Davis

Facebook Increasingly Becomes a Helpful Tool for Employers in Job Interviews | Moneylan... - 6 views

  •  
    It is legal for a prospective employer during a job interview to ask you to log into your facebook page and click through your friends only posts, photos, and messages. This is a very important topic for digital citizens to understand.
  • ...7 more comments...
  •  
    This is an important article. I'm going to discuss it with my Digiteen class this morning and have them comment here.
  •  
    I don't think that is fair. The employer has no right to be a part of their personal life. Although, they need to know about what they say on the internet. I would not want someone i don't know looking at my profile page.
  •  
    This is a good and a bad thing. It is a good thing because if someone is bad than you know not to hire them. it is a bad thing because people should not be judged on what their friends post. Just because their friends might post bad things does not mean that they are bad.
  •  
    Well, for me the act of "shoulder surfing" is good as well bad. It is good because as an employer if I don't know the maybe future employee this would be good to base my opinion on whether or not to hire them. This also can be bad, as the future employee may have private conversation with his or her wife that they do not want anyone to see (this is just to give an example).
  •  
    I guess i could understand why they have this. I personally like this idea in most ways, but not all. For example, its good for finding if the person your employing is a criminal, or someone bad. But its kind of bad because what if someone is not accepted because they were talking with a 'special someone' and the employers saw. That doesn't really seem fair to me, because that is your personal PERSONAL info, and no one else needs to see it besides you and who you are talking to. Unless of course its about something bad like planning something illegal. The main downside i see in this is maybe that person created a fake Facebook that looks all great and seems like they are a good person. Then a not-so-good person might have gotten a job that they wouldn't have gotten otherwise. I can't really decide if this is good or bad, but for now, I'm going to say it's bad.
  •  
    Well i think it is 50/50, because you have to be careful of what you put out there. And i don't think they should go on your friends facebook account to look at there posts and not yours! I also don't think they should judge you by your friends!
  •  
    I dont know exactly if this is fair or not. I can see where employers are coming from by wanting to see their possible employees facebook account, but i also think that a lot of the stuff that we may post may be completely personal while being completely innocent. everyone needs privacy and if they decide to do that through facebook then they have the right.
  •  
    I think its a good video to watch because it definitely made me think. The video also scared me even thought i don't have a Facebook. I now know how to stay safe if i get one.
  •  
    I think that the post is mean. I don't really like the post because it makes the person look bad.
Riya P

Tips for clueless parents in technology - 3 views

  • copy & paste adjust the time on your clock change your desktop background (Mac) change your wallpaper (PC) make text bigger (or smaller) take a screenshot change your screensaver (Mac) change your screensaver (PC)
  •  
    HELP FOR THE CLUELESS!! Any parents out there that are completely clueless about the internet? This site is perfect for learning the basics! Topics Include: THE BASICS WORLD WIDE WEB COMMUNICATION MEDIA FINDING INFORMATION
Margaret O.

Officials: Suicidal Teen Was Cyber-bullied - CBS News - 0 views

  • Officials: Suicidal Teen Was Cyber-bullied
  • CBS)  Officials in Massachusetts believe there's been another deadly case of cyber-bullying in the apparent suicide of 15-year-old Phoebe Prince of South Hadley, Mass.
  • Prince moved last year to the area from Ireland. While making the transition to a new town and a new country, Prince, officials believe, became the target of intense cyber-bullying, which may have contributed to her apparent suicide.
  • ...4 more annotations...
  • Prince's unidentified friend said, "It just makes me sad that it takes the life of a young teenager who had everything going for her to bring the community together to have them realize how bad bullying is."
  • Meline Kevorkian, the author of "101 Facts About Bullying" told CBS News, "Cyber-bullying can be so dangerous because it can lead to cyber-mobbing, which means kids can come together to attack another kid, 24 hours a day, seven days a week."
  • A friend who did not want to be identified told CBS News, "She was being bullied because she was pretty and people were just jealous."Prince's classmate also said he was one of her closest friends, but she never revealed her pain.
  • kids should "know that they are loved and that people care about them, and they can make it through this."
  •  
    This is completely out of hand. There is no reason that this girl should be dead. Cyberbullying is, I believe the worst form of bullying, because some of the people who bully others online don't have the guts to admit it face-to-face with their victims.
Callie S

Tips on how to stay safe online - South Florida Sun-Sentinel.com - 0 views

  • General security Don't use public or shared computers for online banking or investment transactions. Don't give out your account password to anyone, even someone claiming to be from your online service. Your account can be hijacked, and you can find unexpected charges on your bill. Be careful about giving out your credit card number, phone number and home address. Never provide your Social Security number to anyone unless required by law. Email is relatively private -- but not completely. Don't put anything into an electronic message that you wouldn't want to see posted on a neighborhood bulletin board. Delete junk email without even reading it. Never download an email attachment from an unknown source. Opening a file could expose your system to a virus. Be cautious about opening any attachment or downloading any files from emails you receive, regardless of who sent them. These files can contain viruses or other software that can weaken your computer's security. Don't "unsubscribe" on unwanted, un-requested or unsolicited e-mail. That just lets the senders know that they had reached a valid email address. Don't sign up for free offers. Shopping online Know who you're dealing with. Confirm the online seller's physical address and phone number in case you have problems. Know what you're buying. Read the seller's description of the product closely, especially the fine print. Name-brand items at unusually low prices might be stolen or counterfeit. Know what it will cost, including shipping and handling. Never send cash. Pay by credit or charge card. If you pay by credit or charge card online, your transaction will be protected by the Fair Credit Billing Act. Under this law, you have the right to dispute charges under certain circumstances and temporarily withhold payment while the creditor is investigating them. Check out the terms of the deal, like refund policies and delivery dates. A Federal Trade Commission rule requires sellers to ship items as promised or within 30 days after the order date if no specific date is promised. Phishing and identity theft You may receive emails that appear to be from a financial institution, bill paying service, government agency or other business that say something like: "We suspect an unauthorized transaction on your account. To ensure that your account is not compromised, please click the link below and confirm your identity." Do not reply, and do not click on the links. The messages direct you to a website that looks legitimate, but it is a trick to get you to reveal personal information and passwords. Operators can steal your identity and run up bills or commit crimes in your name. Forward these emails to the Federal Trade Commission at spam@uce.gov and to the company, bank, or organization impersonated in the email. Most organizations have information on their websites about where to report problems. Email is not a secure method of transmitting information, so never use it to transmit financial information. Legitimate businesses should not ask you to send sensitive information by email. Area codes can mislead. Some scammers send an email that appears to be from a legitimate business and ask you to call a phone number to update your account or access a "refund." Because they use voice over internet protocol technology, the area code you call does not reflect where the scammers really are. Review credit card and bank account statements as soon as you receive them to check for unauthorized charges.
  •  
    Here are tips to ways to protect your general security,identity, and yourself when shopping online. If you follow these simple rules you will be safer when online.
Callie S

10 Ways To Stay Safe Online... - 0 views

  • 10 Ways To Stay Safe Online 1. Be a responsible cyber citizen. If you use the Internet, you're a citizen of a global community-a cyber citizen. Just like being a citizen of your local community, being a cyber citizen has responsibilities. Use the Internet to share knowledge that makes people's lives better. Keep safe, use good manners and respect the laws. 2. Use anti-virus software. A computer virus is a program that can invade your computer and damage or destroy information. Anti-virus software is designed to protect you and your computer against known viruses. But with new viruses emerging daily, anti-virus programs need to be updated regularly. Check with the web site of your anti-virus software company to see some sample descriptions of viruses and to get regular updates for your software. Stop viruses in their tracks! 3. Do not open email from unknown sources. Delete email from unknown sources. Watch out for files attached to e-mails, particularly those with an "exe" extension-even if people you know sent them to you. Some files transport and distribute viruses and other programs that can permanently destroy files and damage computers and Web sites. Do not forward e-mail if you are not completely sure that any attached files are safe. 4. Use hard-to-guess passwords and keep them private. Do not write passwords down on small pieces of paper taped to your computer. You would be surprised how many people are sloppy about keeping their passwords private. Passwords that are easy to-guess are a bad choice. In other words, if your name is "Dan" do not make your password "Dan." Change your passwords regularly and don't give your passwords to anyone! Tell your family that combinations of letters, numbers and symbols are harder to crack than just words. 5. Protect computers with firewalls. Install firewalls for your family-it is not difficult. A firewall helps prevent hackers from breaking into your computer or the computers that belong to your family. Firewalls help prevent thieves from stealing and using private information including your phone number and credit card numbers, which may be stored on a family computer. 6. Do not share access to your computers with strangers. Learn about file sharing risks. Your computer operating system may allow other computers on a network, including the Internet, to access the hard-drive of your computer in order to "share files". This ability to share files can be used to infect your computer with a virus or look at the files on your computer if you do not pay close attention. Check your operating system and other program help files to learn how to disable file sharing. Do not share access to your computer with strangers! 7. Disconnect from the Internet when not in use. The Internet is a two-way road. You get information and also send information. Turning off the Internet makes sure that someone else on the Internet can't enter your computer and cause harm. Disconnecting your computer from the Internet when you are not online lessens the chance that someone will be able to access your computer. 8. Back-up your computer regularly. Help your family back up all household computers onto external media such as CD's or diskettes. 9. Regularly download security protection update "patches". Security flaws are regularly found in operating systems and application software. Companies that make software release quick fixes called "patches" that you should install to correct the latest software flaw. It is a good idea to check for security updates on the publisher's Web site for all the software you own. 10. Help your family to check computer security on a regular basis. Evaluate computer security at least twice a year. To help remember, do it when you change the clocks for daylight-savings time! Check for all of the items listed previously.
  •  
    Safe ways online and how to keep your privacy.
  •  
    website uses ten safety rules to stay safe online. 1. Be a responsible cyber citizen. 2. Use anti-virus software. 3. Do not open email from unknown sources4. Use hard-to-guess passwords and keep them private.5. Protect computers with firewalls.6. Do not share access to your computers with strangers. Learn about file sharing risks.7. Disconnect from the Internet when not in use.8. Back-up your computer regularly.9. Regularly download security protection update "patches". 10. Help your family to check computer security on a regular basis.
  •  
    When online you should follow these tips to stay safe.
Kreslyn C

5 Smart rules for children to stay safe online - Bicester Computers Support Forum - Com... - 0 views

  •  
    This shows a fun graph of the word smart and tells how to be safe.
Hayes G.

How to Protect Yourself Online - 0 views

  • Personal firewalls and security software packages (
  • Be Careful What You Download
  • Don't Respond to Emails Requesting Personal Information
  • ...5 more annotations...
  • Log Out Completely. Closing or minimizing your browser
  • The best passwords are ones that are difficult to guess.
  • Using a security token can make it even harder for an identity thief to access your online brokerage account.
    • Hayes G.
       
      ways to protect yourself on the internet
  • Make sure the computer you are using has the latest security patches,
Joseph Edore

Internet Safety | Guest Services | Disney - 0 views

  • Internet Safety Ask Questions The best form of Online Safety begins at home with you, the parent. We offer you the following tips to keep your child safe on the Internet. The best way to know what your child is doing online is to ask. Whether you ask other parents, an Internet-savvy friend, or your child about how they use the Internet asking the right questions will help you understand what your child is doing online so you can make sure they are making safe online choices. Questions to ask your child: What sites do you visit? What do you do on those sites? Why do you go to that site? How much time do you spend on the site? Did you have to register? What information did they ask for? What information did you give? Spend time surfing the Web with your child. This is a great way to learn about what types of interactions your child is having online, and with whom.
  • Communicate Once you have an idea of how your child uses the Internet and what is available to them, you can establish online guidelines and rules. Whether it's setting guidelines about which sites to visit or what's okay to do online, it is essential to clearly communicate the rules to your child. Speak often to your child about potential risks and what to do in various situations. Encourage your child to ask questions about situations they run into. Being aware of the risks your child faces, and communicating frequently with your child about these risks, will help develop their judgment and responsibility about Internet usage.
  • Safety Rules While the Internet offers amazing opportunities for entertainment, education, connectivity, and more, anyone who goes online should understand basic Online Safety. Teaching these basics to your children is essential. When asked by friends or strangers, online or offline, never share Account IDs and Passwords. Don't reveal any personal identity information in your Screen Names, such as your birthday, hobbies, hometown or school. In any information exchange, like e-mail or chat, never give any personal information about yourself or someone else. Don't share photos of yourself, your family, or your home with people you meet online. Never open e-mails that come from unknown sources DELETE them. If you receive mean or threatening comments online, don't respond. Log off and report the activity to your parents. Nothing you write on the Web is completely private. Be careful what you write and to whom. Never make plans to meet an online "friend" in person. WHEN IN DOUBT: Always ask your parents for help. If you're not sure, log off.
Brody C

Internet Safety - 0 views

  • WDIG'S Internet Safety Tips Keep your passwords private, even from your best friend! Your online service will never ask for them, so neither should anyone else. Use only your log-in name and/or e-mail address when chatting or sending e-mail. Never give out personal information like your name, address, or phone number. Don't share photos of yourself, your family, or your home with people you meet online. Always delete unknown e-mail attachments without opening them. They can contain destructive viruses. If a person writes something that is mean or makes you feel uncomfortable, don't respond. Just log off and tell your parents, who can report it to your online service provider. Remember that nothing you write on the Web is completely private -- including e-mail. So be careful and think about what you type and who you tell. Not everyone is as nice, cute, and funny as they may sound online. Never make plans to meet an online "friend" in person. WHEN IN DOUBT -- always ask your parents for help -- and just LOG OFF if you're not sure! You can always go back online later.
Brody C

Internet Safety - 0 views

  • A basic understanding of how Internet risks occur helps to place any Internet safety advice in context. Once you identify which factors have a greater impact on you and your family, you can adapt recommendations to your specific needs. Take a moment to consider each of the six factors that contribute to the current online environment:Lack of knowledge. Consumers of every age and at every level of technical expertise lack broad online safety education. This lack of knowledge is not limited to young people, but extends to the general population, including computer specialists who may not know any more than others about online predatory behavior.Carelessness. Even when we ‘know better,’ we make mistakes. Usually those mistakes occur when we’re tired, rushed, or don’t have a complete understanding of the risks involved. This is especially true when there is no obvious cause and effect to help us correct our behavior. When you post information that is used a month later to rob your home, you are not likely to recognize a connection between the two events. In fact, the vast majority of victims of online crime will not recognize that an action they or someone else took online made them vulnerable to a criminal act.Unintentional exposure of (or by) others. It may be a teacher, school, parent, child, friend, employer, or after-school program that provides publicly accessible information that exposes you. Perhaps your own computer (or mobile phone, or other connected device) has been compromised with spyware that enables criminals to collect your personal information. Maybe when a friend’s computer or other Internet-enabled device was lost or stolen, your information fell into the wrong hands.Technology Flaws. Online products and services can expose consumers – either because the companies who offer them fail to secure their customers’ data and are hacked, or because a company fails to build in adequate safeguards and safety messaging into their product to protect consumers.Holes in consumer protection standards. We cannot place the full burden of online safety on consumers.
1 - 20 of 21 Next ›
Showing 20 items per page