Skip to main content

Home/ Digiteen/ Group items tagged covers

Rss Feed Group items tagged

Emma S

copyrightlaws.com » International Copyright Law from a Management Perspective - 1 views

  •  
    THis web site shows international copyright laws and what it covers and where it is covered. 
William B

Top 10 Cases of Extreme Game Addiction - 1 views

  • Video games can be very addicting; in fact, some people accuse developers of making the games addictive on purpose. The following are 10 cases of video game addiction that get more and more extreme. 10 Skipping School I’ve skipped school before, but this kid takes the cake for the most elaborate excuse. A 15-year-old from Perth, Australia, skipped school to play online games for over 16 hours a day, over a full three weeks. How did he do this? Every morning he put on his school uniform until his mother went to work. As soon as she left, he would change out of it and started playing. His mother would return home after he was supposed to have come home from school. To cover for himself at school, he had informed the school he was having surgery. His parents finally caught on to his ruse when the school contacted them to check up on him. 9 Teen Burns Classmate How many of us have gotten into a schoolyard scuffle? We’ve all been there, but a boy in Beijing took it to the next level. Apparently having lost himself in the game, World of Warcraft, he “became” a fire mage in his mind, and set his classmate on fire. For those who don’t play World of Warcraft, I’m sure it’s fairly easy to deduce what a fire mage does by putting two and two together. 8 Fifty-Hour Starcraft Session I’ve pulled all-nighters before while playing games, but a man in South Korea almost pulled off three all-nighters…in a row. After a 50-hour Starcraft session, the South Korean man collapsed and died from heart failure. It was presumed that his death was caused by exhaustion, because he had only stopped to use the washroom and for short periods of sleep. There have been other cases in China where people have been playing anywhere from 3 to 15 days. However I chose to include this one because it received attention from a major news agency. 7 Suicide over a Game On December 27, 2004, Xioyi left a suicide note saying he wanted “to join the heroes of the game he worshiped.” The thirteen-year-old then jumped off a tall building after playing World of Warcraft for 36 hours straight. His parents are now suing the Chinese distributors of the game for $12,500. 6 Girl Dies Because of Neglect A three-year-old South Korean girl died of neglect when her parents spent more time raising a virtual girl than her. The game they had been playing was Prius Online, a game similar to Second Life where players work virtual jobs and well… live a second, virtual, life. The couple had left for a 12-hour gaming session at an internet café, leaving their daughter unattended. Upon returning home, they found her dead. googletag.display('div-gpt-ad-1350520431768-2');
  •  
    Video games can be very addicted. It can cause people to hurt themselves and kill themselves because they are so addicted. Many people eat so addicted to a game they only care about the game and nothing else. "Video games can be very addicting; in fact, some people accuse developers of making the games addictive on purpose. The following are 10 cases of video game addiction that get more and more extreme. 10 Skipping School skipping school.jpg I've skipped school before, but this kid takes the cake for the most elaborate excuse. A 15-year-old from Perth, Australia, skipped school to play online games for over 16 hours a day, over a full three weeks. How did he do this? Every morning he put on his school uniform until his mother went to work. As soon as she left, he would change out of it and started playing. His mother would return home after he was supposed to have come home from school. To cover for himself at school, he had informed the school he was having surgery. His parents finally caught on to his ruse when the school contacted them to check up on him. 9 Teen Burns Classmate firemage.jpg How many of us have gotten into a schoolyard scuffle? We've all been there, but a boy in Beijing took it to the next level. Apparently having lost himself in the game, World of Warcraft, he "became" a fire mage in his mind, and set his classmate on fire. For those who don't play World of Warcraft, I'm sure it's fairly easy to deduce what a fire mage does by putting two and two together. 8 Fifty-Hour Starcraft Session starcraft-2-logo.png I've pulled all-nighters before while playing games, but a man in South Korea almost pulled off three all-nighters…in a row. After a 50-hour Starcraft session, the South Korean man collapsed and died from heart failure. It was presumed that his death was caused by exhaustion, because he had only stopped to use the washroom and for short periods of sleep. There have been other cases in China where people have bee
Dru F

Netiquette: Rules of Behavior on the Internet | Education.com - 0 views

  • The etiquette guidelines that govern behavior when communicating on the Internet have become known as netiquette. Netiquette covers not only rules of behavior during discussions but also guidelines that reflect the unique electronic nature of the medium. Netiquette usually is enforced by fellow users who are quick to point out infractions of netiquette rules.
  •  
    "The etiquette guidelines that govern behavior when communicating on the Internet have become known as netiquette. Netiquette covers not only rules of behavior during discussions but also guidelines that reflect the unique electronic nature of the medium. Netiquette usually is enforced by fellow users who are quick to point out infractions of netiquette rules."
October H

Senators say digital privacy law covers smartphones - The Hill's Hillicon Valley - 0 views

  •  
    "The law that protects private computers from unauthorized access also applies to smartphones and other electronic devices, according to a letter from two Democratic senators."
  •  
    Not only does the law protect computer, but also is protecting our smartphones.
Emma S

International and Foreign Copyright - University of North Texas Libraries - 0 views

  •  
    This is a great website that covers a few basic international agencies and what they do to help protect copyright. It also included a few international treaties that have had a major impact on international copyright. 
d l

Shocking statistics and video about texting while driving | SafeTeens.com - 1 views

  •  
    This covers all the info on health with technology.
Sheri Williams

High School Global Collaboration - 2 views

I am working with a World Studies teacher in my building on a global project in which we want students to collaborate with their peers accross the globe. We are looking for teachers and students t...

started by Sheri Williams on 05 Jan 11 no follow-up yet
Jerilyn J

Club Penguin - Parents: Parent's Guide - 0 views

  • Club Penguin is a snow-covered, virtual world where children play games and interact with friends in the guise of colourful penguin avatars.
  • In addition to being a great place to play and have fun, Club Penguin is a great place to learn and grow. On Club Penguin, children practice reading, develop keyboarding skills and participate in creative role playing. By accumulating and spending virtual coins earned through game play kids practice math and learn about money management.
Rachel H

Dell - Healthy Internet Habits | Dell - 0 views

  • Talk About It Talk with your kids about the Internet, and encourage them to see it as a shared, open environment in which they have social responsibilities just as they would in any physical environment.With open discussion, you can set expectations about the behavior you expect from them, curb negativity and discourage behaviors such as secrecy, boundary-pushing or thrill-seeking. You can also emphasize that online safety is something you care about and will continue to examine.Keep in mind: Enjoy the Internet along with your children, and discuss the ways in which it brings value into your lives.Stay open to your kids' questions, and encourage them to share their Internet experiences with you without fear of punishment about what they read, see or experience.Discuss how to safely interact online with others, why kids should stay away from certain types of content and individuals, and that Internet rules are there to protect kids. Teach children to trust their instincts, and to come to you if something or someone online makes them feel uncomfortable or threatened. Stay calm and remind them that they are not in trouble for bringing issues to your attention. Praise their discretion.As kids get older, keep family communications about the Internet as open and positive as you can. Talk with your kids about their online friends and activities just as you would talk about other friends and activities.
  • Set Rules for Internet Use Lay out rules for Internet use, setting clear expectations for your kids' online habits. A good set of rules should include things like the amount of time kids are allowed to be online, what types of content are appropriate and who it's okay to chat with as well as proper online conduct and good Internet citizenship.Keep in mind: The most successful rules are those that are created collaboratively. Work with your kids to draw up an online family safety contract that the whole family can agree to and sign. Discuss the rules frequently. Remind them that the rules are in place to protect your family, and that strictly maintaining privacy online can lower the risk of being targeted by online predators. Tell kids that following the rules and keeping communications open will allow them to gain freedoms as they get older. Let them know that you will reevaluate the rules over time. You can reinforce the rules you set by enabling restrictions on your PC. Windows Live Family Safety lets you set parameters that can limit Internet searches, monitor and filter specific websites, receive detailed activity reports of your child’s online activities, and let you be in control of who your child can communicate with in Windows Live Spaces, Messenger, or Hotmail1.
  • Balance Time Online Maintaining a balance between entertainment and other activities in kids' lives can be a serious challenge. The Internet has made it even more difficult, as the lines between entertainment and education are often blurred. Modeling a healthy balance between your online and offline activities is a great way to encourage children to do the same.Keep in mind: Enforce rules about the amount of time your kids may spend online, and the hours they are allowed to go online. Help your kids develop self-control, discipline and accountability regarding Internet use. Use parental controls in Windows 7 to limit PC time. Set up individual user accounts to determine how much computer time children have and what hours of the day they are allowed to use the PC, as well as which programs and games they can access.Encourage and support their participation in other activities — particularly physical pastimes with other children. If your child is reluctant, look for offline activities that tap into the same interests your kids pursue online. Watch for signs of Internet dependency. If Internet use seems excessive or begins to affect your child's school performance, health or relationships, consider professional counseling for Internet addiction.
  • ...2 more annotations...
  • Distinguish Between Fact and Opinion Let's face it: There's a lot of content on the Internet that isn't helpful or reliable. While more online fact checking happens today than previously, the ability of nearly anyone to offer opinions or build Web sites can make the Internet a confusing place for young people.Teach your kids how the Internet works, and encourage critical thinking. Train them to use a variety of online resources and to always check, question and verify what they see online. Ultimately, these skills can help your kids avoid bad situations and individuals — such as online predators — that may seek to mislead or trick Internet users. Keep in mind: Start young. Even preschool students use the Internet to look up information. Teach them early to distinguish fact from opinion, and discuss ways to recognize bias, propaganda and stereotyping.Challenge your kids to evaluate what they see online by asking: What is the purpose of this site? To entertain? To sell? Does it provide the author’s contact information or an "About Us" section? Does a company or an individual person sponsor it? Is it a public conversation? Finally, challenge them to consider whether the Internet is the best place to find the information they need.Discuss racism and other forms of hatred with your kids. Software filters can help block hateful material, but critical thinking and an awareness of history and world events can help children recognize more subtle biases.
  • Keep Personal Facts Private Online privacy is vital to your family's safety. Ensuring that your kids communicate online only with people known to them and your family can help limit their contact with unsavory elements. Still, as kids grow older, they are bound to make new friends online. As your kids grow into middle and high school, the most recent research shows that the greatest threat to their safety is actually from people in their own age group, or slightly older.Keep in mind: Ensure that children keep facts such as their real name, age, gender and location private. Discuss how details in photographs can reveal more information to would-be predators than your child intends.Many kids routinely visit social networks and blogs where they may post pictures, make comments and write personal entries. Insist that your kids keep personal information private and that they think twice before joining location-based peer groups that may give away information on their whereabouts.Ensure that your kids understand the risks involved in making private or personal information public online. Keep an open dialogue about the people they come into contact with online. Discuss and evaluate online relationships as you would any other relationships in your child’s life. In this section, we covered some basic knowledge all parents should keep in mind when their children are online. Impress upon your kids the seriousness of online safety concerns, while making sure to keep the lines of communication open and non-judgmental. In the next section, we’ll look at ways to ensure your family’s privacy online isn’t compromised.
  •  
    healthy habits for online
Susan Davis

Respect the Netiquette! - 1 views

  • "Netiquette" is network etiquette, the do's and don'ts of online communication. Netiquette covers both common courtesy online and the informal "rules of the road" of cyberspace
Jeff Ratliff

CBS 60 Minutes covers Conficker, malware epidemic - ZDNet - 0 views

  •  
    Video link.
Brody C

Safety and Security on the Internet - 0 views

  • Why Should I Worry About Security? The Internet is a global collection of Interconnected Networks that facilitate information exchange and computer connectivity. The Internet is comprised of many different computers, all of which fall into two categories: servers (also known as "hosts") and clients (also known as "guests") -- technically, everything on the Internet can be considered a "host," but for this discussion, we'll use "hosts" and "guests." Guest machines send bursts of computer data called "packets" which are analyzed by the server belonging to the guest's Internet service provider. If the data is located locally (on the ISP's machine), the ISP's server will return the packets. If the information sought is not local (on another machine), the ISP's server hands off the packets to a router, which then sends the packets to the server containing the information. Once the information is located, it is sent back to the guest machine. There are many different types of computers that fill these two categories: mainframes, minicomputers, PCs, Macintosh, Unix and others. Despite the many varieties of computers that combine to form the Internet, every computer connected to the Internet needs to be able to communicate with every other computer -- without this ability, there is no Internet. All of these computers are able to communicate because in a sense they can all speak the same language -- TCP/IP. TCP/IP actually isn't a language; it is in computer terms what is known as a "protocol." A protocol is simply a standard for transmitting and receiving bits of information. As long as all of the interconnected computers follow the same protocol, they can exchange information. Unfortunately, when data is sent from one computer to another on the Internet, every other computer in between has an opportunity to see what's being sent. This poses an obvious security problem.
  • Say you decide to purchase concert tickets on the Web. To do so, you need to fill out an electronic form with your name, address and credit card number. When you submit the form, your information passes from computer to computer on its way to the concert ticket web server. It is possible that someone could be watching the data passing through one of the computers that is in between your computer and the concert ticket server. No one knows how often this happens, but everyone concedes it is technically possible. And its also possible off the web, too -- E-mail can be captured (and read, if not encrypted), as can file transfers via unsecure FTP. If someone wanted to, it wouldn't be too difficult to connect a capture device to someone's phone line (assuming they use a modem to connect to the Internet) and steal an electronic copy of the data exchanged on the Internet. Even if you make your purchase on a secure web site supporting the latest security features, it has been recently shown that secure sites can cause Internet Explorer (and other browsers) to send sensitive information to a non-secure server in plain text format.
  • The point is, there are a lot of security issues related to a network such as the Internet. No FAQ could possibly cover them all. That is why this FAQ concentrates on Internet Explorer. Because there are millions of people who use Microsoft Windows family products, and because those millions have the ability to blend Internet Explorer with these products, the seriousness about security should be of paramount importance to everyone. Remember,  software products are only as secure as the environment in which they operate.
  • ...2 more annotations...
  • What Security Features does Internet Explorer Have? Internet Explorer is a safe browser in many ways. The latest version of IE supports Secure Socket Layer (SSL) 2.0/3.0, Private Communication Technology (PCT) 1.0, CryptoAPI, and VeriSign certificates, and one version employs 128-bit encryption, one of the strongest forms of encryption that's commercially available for use over the Internet. To see if you have the 128-bit version of Internet Explorer, go to the Wells Fargo Bank site and take their browser test. "Secure Socket Layer (SSL) is a Netscape-developed protocol submitted to the W3C working group on security for consideration as a standard security approach for World Wide Web browsers and servers on the Internet. SSL provides a security "handshake" that is used to initiate the TCP/IP connection. This handshake results in the client and server agreeing on the level of security they will use and fulfills any authentication requirements for the connection. Thereafter, SSL's only role is to encrypt and decrypt the byte stream of the application protocol being used (for example, HTTP). This means that all the information in both the HTTP request and the HTTP response are fully encrypted, including the URL the client is requesting, any submitted form contents (such as credit card numbers), any HTTP access authorization information (usernames and passwords), and all the data returned from the server to the client." -- Microsoft's IIS 1.0 Features Tour. It has been reported, however, that SSL has been cracked. Private Communication Technology (PCT) is a Microsoft-developed security protocol available in IE only. According to their Internet draft, "The Private Communication Technology (PCT) protocol is designed to provide privacy between two communicating applications (a client and a server), and to authenticate the server and (optionally) the client. PCT assumes a reliable transport protocol (e.g., TCP) for data transmission and reception. The PCT protocol is application protocol-independent. A "higher level" application protocol (e.g., HTTP, FTP, TELNET, etc.) can layer on top of the PCT protocol transparently. The PCT protocol begins with a handshake phase that negotiates an encryption algorithm and (symmetric) session key as well as authenticating a server to the client (and, optionally, vice versa), based on certified asymmetric public keys. Once transmission of application protocol data begins, all data is encrypted using the session key negotiated during the handshake." IE also supports server and client authentication by using digital certificates to identify users to web servers. In addition, IE supports code signing with Authenticode, which verifies that downloaded code has not been modified. For more information on Authenticode, visit Microsoft's Authenticode page or the excellent Authenticode FAQ page. CryptoAPI 1.0 provides the underlying security services for the Microsoft Internet Security Framework. CryptoAPI allows developers to integrate cryptography into their applications. Microsoft has given a great deal of thought to the issue of security and it products, and Internet Explorer 4.0 is no exception. From "Security Zones" to continued support and refinement of Authenticode, IE4 promises to be one of the safest browsers of all time.  You can read all about the security available in IE 4 at http://www.microsoft.com/ie/ie40/?/ie/ie40/features/ie-security.htm. Also, check out what Microsoft is doing to keep transactions private with IE 4.
  • What are "Cookies?" Cookies are small text files that are sent to web browsers by web servers.  The main purpose of cookie files are to identify users and to present customized information based on personal preferences.  Cookie files typically contain information such as your name (or username), password information, or ad-tracking information.  There is a good body of literature on  the Internet about cookies.  Despite what you may have read or heard, most people, including myself, do not view cookies as any kind of a security threat.  However, because of the way cookies work (e.g., a web server storing a text file on someone's hard drive), Microsoft (and other browser manufacturers) have built options into their browsers that notify users when cookies are being passed to them, and give the user an option to prevent the cookie from being accepted.  I don't think this is a good idea.  By rejecting cookies, your browser may not display the entire page or the site may not function as intended. The reality is that cookies are text files -- they cannot contain viruses or execute applications, they cannot search your hard drive for information or send it to web servers, and most of the information they contain is simple tracking information designed to effect better customer service.
  •  
    safe things to do on the Internet and what to learn that is big
hannah h

Internet Collaboration: Good, Bad, and Downright Ugly - 0 views

  • Tips for Effective Internet Collaboration
  • in order to make the most of an often bad situation, I offer eight tips for effective Internet collaboration. These tips were developed based on my experiences over the past
  • While
  • ...14 more annotations...
  • c communication re
  • I believe strongly that electroni
  • mains a poor substitute for face-to
  • -face communication, I also realize that some collaborative projects would n
  • t be practical without it. So,
  • ew years with groups that follow them and
  • th groups
  • with groups that don't.
  • 1. Appoint a single leader or a small group of leaders who are responsible for making sure everything runs smoothly. These leaders need not have any decision-making authority, but they should have administrative responsibilities such as: keeping debates on topic, setting and enforcing deadlines, maintaining the group mailing list, and keeping a group archive. They should also be willing to serve as a resource and answer questions from group members so that these questions need not clog the mailing list. These leaders must be diligent about carrying out their responsibilities and should seek assistance should they find themselves over burdened. 2. Establish a no flame policy for your group. Flame wars are destructive to just about any collaborative effort. Group leaders should make a point of not involving themselves in flame wars, even if they are the target of a flame. They should also gently remind other group members of the policy. Some groups may wish to give a leader the authority to remove group members who repeatedly engage in flame wars. 3. Establish a policy of open communication between all group members. Members should keep everyone informed of the progress they have made i
  • n carrying out their responsibilities. If someone is havin
  • Establish
  • trouble completing a task they volunteered to do (due to lack of time, lack of expertise, or any other reason), they should inform other group members. If some group members communicate privately about a group matter, they should inform the rest of the group about the outcome of their discussion (being careful to say ``we recommend'' rather than ``we decided'' unless the group has given them the authority to make the decision). It is especially important for anyone in a leadership position to communicate with other members and make sure that the members are communicating with each other. 4. Establish a mission statement and set of operating procedures for your group. Depending on the size of your group and the duration of your project, this may be a short list of ground rules or a formal constitution. You should have guidelines and rules that cover the responsibilities of the leaders, the responsibilities of members, procedures for making decisions (including what to do in the event of a deadlock), procedures for appointing and expelling group members or leaders, and procedures for changing these rules. When working on a long-term, open ended project it is best to keep the ground rules somewhat flexible so that unanticipated ideas are not precluded and new group members don't feel stifled by a framework established by members long-retired. 5. Whenever a new and likely controversial topic is introduced to the group, have people respond to the original poster rather than to the entire mailing list. Then have the original poster collect all the responses into a single message (and if possible prepare an executive summary) and send that back to the group. You may want to repeat this for several rounds of discussion before opening the topic up for general debate. The idea here is to put all the issues on the table at once so that people don't start a debate before they have all the facts and a general understanding of the concerns of other group members. 6. Hold periodic virtual meetings. This can be done through a conference call, audio or video online conferencing software, an online chat room, or even an agreement that everyone will be online and checking their email at a specified time. Any of these formats should allow for a more or less synchronous debate followed, if necessary, by a vote. 7. If your group has trouble making decisions and is unable to get group members together for a virtual meeting frequently enough, try resorting to an electronic equivalent of Roberts Rules of Order in which the rules of debate are spelled out in great detail. (The nice thing about Robert's Rules is that they have been well established and thus groups can agree to adopt them without arguing over what they should be. Adopting a set of electronic rules for debate may be tricky if your group has to write these rules from scratch. But you may be able to get your group members to agree t
  • o adopt a set of rules written by
  • subcommittee or a neutral party.) Such rules might include the maximum amount of time allowed for a debate before a vote must be taken, the amount of time members have to submit their votes, and the maximum number of words or separate email messages a member may send to the mailing list on a particular topic. I see this mostly as a method of last resort, and I don't recommend writing this into the group's constitution or ground rules unless you've tried it and found it to be effective. 8. Try to find ways for as many of your group members as possible to meet in person. Ideally you would fly everyone to a central location for a group retreat. But financial concerns often don't allow for such luxuries, so do the best you can. Encourage group members to visit their geographically closest neighbors in the group and to meet other members at conferences or when traveling. The more group members get to know each other, the easier collaboration will be. If possible, try to get the entire group together at the beginning of the project and at the end of the project (or for a lengthy project, after every major phase of the project has been completed). Getting the entire group together at the beginning will help the group establish a common sense of direction. Meeting at the end or after the completion of a major phase will provide a sense of closure and an opportunity for group members to evaluate what they have done.
  •  
    This is some collaboration tips.
Madison T.

A teenager promotes internet safety - 0 views

  • Her presentation, titled “Better Safe than Sorry,” outlines the social network environment that she said may be foreign to most parents but very common to students.It covers Facebook, Twitter, Skype, Friendster, Bebo, Yahoo, Google Plus, Classmates, Flicker, Instagram, You Tube and My Space, all social networking programs, Aguilera said.Aguilera said with so many people using social networking and so many young people posting personal information, its important that teens learn the basics of operating safely on the Web.
  •  
    This teenager promotes Global Awareness for Internet safety with her presentation "Better Safe than Sorry"
Andy J

iLearn Technology » Blog Archive » 16 of the Best Internet Safety Sites for Kids - 1 views

  •  
    This page shows you 16 of the best websites for children. It is very useful and helps out a lot. Quotes: 'This is the time of year when I am usually introducing Internet Safety to my students. Internet safety is something I really stress in the computer lab. We hit it strong in the beginning of the year and revisit it several times throughout the rest of the year. If you are using the Internet with students, Internet safety needs to be covered.'
  •  
    Digiteen research website 16 of the best internet safety sites for kids
1 - 16 of 16
Showing 20 items per page