Skip to main content

Home/ Digiteen/ Group items tagged differences

Rss Feed Group items tagged

Vicki Davis

World of Warcraft Obsession - has 36 accounts, Raids by Himself | Ripten Video Game Blog - 0 views

  •  
    Addictive behaviors is a concern when talking about online games or anything that people like -- I think this person is a perfect example of an addiction to a game, World of Warcraft, gone haywire.
  •  
    There are hobbyists and there are fanatics. I cannot imagine the pricetag for the computer set up shown here and have to hope that these 11 computers used simultaneously to play world of warcraft are put to "good use" at other times during the day. I also see someone who is online but is not connected with others. To me, if I do things online - I like social spaces because of the "interaction" -- sort of like creating your own friend network of 36 different people and tweeting yourself all day -- sort of Sybil-ish, I think. Addictive behaviors is definitely part of digital health and wellness and helping people know when to draw the line.
Rachel H

ADHD and Internet Addiction - 0 views

  • The Causes of Internet Addiction Although the causes of Internet addiction differ depending on the teen in question, experts at Stone Mountain School, a private boarding school for boys in North Carolina, have observed the following common precursors to Internet addiction: Low self-esteem Poor self-image Lack of achievements Feeling undervalued A feeling of lack of control over one’s life A feeling of being trapped Lack of a structured environment Stress and real-world problems Difficulty making and sustaining relationships Strained home environment Lack of community or friends Difficulty regulating persistent negative emotions Lack of a stimulating learning environment Lack of opportunities for mastery Lack of opportunities for exploration Lack of opportunity to play
  • Although the causes of Internet addiction differ depending on the teen in question, experts at Stone Mountain School, a private boarding school for boys in North Carolina, have observed the following common precursors to Internet addiction: Low self-esteem Poor self-image Lack of achievements Feeling undervalued A feeling of lack of control over one’s life A feeling of being trapped Lack of a structured environment Stress and real-world problems Difficulty making and sustaining relationships Strained home environment Lack of community or friends Difficulty regulating persistent negative emotions Lack of a stimulating learning environment Lack of opportunities for mastery Lack of opportunities for exploration Lack of opportunity to play Warning Signs of Internet Addiction Computers are going to remain a central part of American life, so it is essential for parents to learn ways to monitor their child’s computer use and detect the symptoms of Internet addiction. The experts at Stone Mountain School advise parents to watch for the following signs of Internet addiction: Preoccupation with the Internet Change in eating habits, sleep patterns or school performance Physical ailments such as numbness in the hands, eye strain, weight gain or loss, and headaches, back aches or neck aches Neglecting personal hygiene Missing school or work to surf the Web Refusing to do chores or fulfill other responsibilities because of Internet time Using the Internet longer than allowed or desired An inability to cut back on Internet use Giving up previously enjoyable activities in order to spend more time on the Internet Neglecting friends and family in favor of spending time on the computer Defensiveness or efforts to hide or lie about Internet use Becoming irritable when unable to use the Internet Isolating oneself socially or viewing the Internet as an escape Like other forms of addiction, Internet addicts experience difficulty quitting, tolerance (craving more and more screen time) and withdrawal (irritability, anxiety and boredom) when not using the Internet.
  • Warning Signs of Internet Addiction Computers are going to remain a central part of American life, so it is essential for parents to learn ways to monitor their child’s computer use and detect the symptoms of Internet addiction. The experts at Stone Mountain School advise parents to watch for the following signs of Internet addiction: Preoccupation with the Internet Change in eating habits, sleep patterns or school performance Physical ailments such as numbness in the hands, eye strain, weight gain or loss, and headaches, back aches or neck aches Neglecting personal hygiene Missing school or work to surf the Web Refusing to do chores or fulfill other responsibilities because of Internet time Using the Internet longer than allowed or desired An inability to cut back on Internet use Giving up previously enjoyable activities in order to spend more time on the Internet Neglecting friends and family in favor of spending time on the computer Defensiveness or efforts to hide or lie about Internet use Becoming irritable when unable to use the Internet Isolating oneself socially or viewing the Internet as an escape Like other forms of addiction, Internet addicts experience difficulty quitting, tolerance (craving more and more screen time) and withdrawal (irritability, anxiety and boredom) when not using the Internet.
stephanie j

Virtual Worlds Review: Virtual Worlds List By Category - 0 views

  • Best for Teens Coke Studios Dubit Habbo Hotel The Manor The Palace Playdo Second Life for Teens The Sims Online Sora City There TowerChat whyrobbierocks.com Yohoho! Puzzle Pirates
  • Free Access! Active Worlds Coke Studios Dreamville Dubit Habbo Hotel Mokitown Moove Muse The Palace Playdo Second Life Sora City There TowerChat Traveler Virtual Ibiza Virtual Magic Kingdom Voodoo Chat whyrobbierocks.com Whyville Worlds.com Yohoho! Puzzle Pirates
  •  
    list of many different virtual worlds
Karly D

Should Teachers Friend Their Students? | Powerful Learning Practice - 2 views

  •  
    Everyone has different opinions on this controversial subject.
 Lisa Durff

What Is Social Networking? - What is Social Networking? - 1 views

  •  
    Social networking is different from educational networking and both are different from offline networking. But these three also have important similarities. What are they?
JordanB_mca MCA

Digital Law Online: Abstraction, Filtration, Comparison - 0 views

  •  
    This website has infractions on the computer and technology. It has all of these different ways to do the right thing on the computer
JordanB_mca MCA

The future lies in Digital Collaboration - Express Computer - 0 views

  •  
    tells us about new ways to work together in the future. It shows different jobs on how to collaborate.
MattB_mca MCA

Law Practice Magazine :: Six Ways to Work Better with Others Online - 0 views

  •  
    there's different ways to communicate over the Internet with a business or etc. you can cut costs with online messaging. Online messaging helps to get someone information right away
PatG_mca MCA

untitled - 0 views

  •  
    This source has the many different rights listed of what people can and can't do. It also states rules from books that people have broken in the past that they enforce more on.
PatG_mca MCA

Digital Television : Broadcast Law Blog - 0 views

  •  
    This source is about many different laws placed on television. It is mainly the same laws as online laws. It places many restrictions including, not stealing cable or doing things that you aren't allowed to do.
Steve Madsen

Scarygirl's more than just a pretty face - web - Technology - smh.com.au - 0 views

  •  
    Passion Pictures Australia is trying a different strategy, using a free online game to bring the delightful Scarygirl to the world's attention years ahead of a proposed animated feature film.
Steve Madsen

Public Sphere | Kate Lundy - 0 views

  •  
    An Australian politician sets up mechanisms for the public to participate in discussions that have political importance.
  •  
    A "Public Sphere" is a space that "…through the vehicle of public opinion it puts the state in touch with the needs of society" [2]. This kind of engagement in public policy is a great way to represent different views and harness a broad range of expertise, particularly on topical issues of the day.
Brody C

Safety and Security on the Internet - 0 views

  • Why Should I Worry About Security? The Internet is a global collection of Interconnected Networks that facilitate information exchange and computer connectivity. The Internet is comprised of many different computers, all of which fall into two categories: servers (also known as "hosts") and clients (also known as "guests") -- technically, everything on the Internet can be considered a "host," but for this discussion, we'll use "hosts" and "guests." Guest machines send bursts of computer data called "packets" which are analyzed by the server belonging to the guest's Internet service provider. If the data is located locally (on the ISP's machine), the ISP's server will return the packets. If the information sought is not local (on another machine), the ISP's server hands off the packets to a router, which then sends the packets to the server containing the information. Once the information is located, it is sent back to the guest machine. There are many different types of computers that fill these two categories: mainframes, minicomputers, PCs, Macintosh, Unix and others. Despite the many varieties of computers that combine to form the Internet, every computer connected to the Internet needs to be able to communicate with every other computer -- without this ability, there is no Internet. All of these computers are able to communicate because in a sense they can all speak the same language -- TCP/IP. TCP/IP actually isn't a language; it is in computer terms what is known as a "protocol." A protocol is simply a standard for transmitting and receiving bits of information. As long as all of the interconnected computers follow the same protocol, they can exchange information. Unfortunately, when data is sent from one computer to another on the Internet, every other computer in between has an opportunity to see what's being sent. This poses an obvious security problem.
  • Say you decide to purchase concert tickets on the Web. To do so, you need to fill out an electronic form with your name, address and credit card number. When you submit the form, your information passes from computer to computer on its way to the concert ticket web server. It is possible that someone could be watching the data passing through one of the computers that is in between your computer and the concert ticket server. No one knows how often this happens, but everyone concedes it is technically possible. And its also possible off the web, too -- E-mail can be captured (and read, if not encrypted), as can file transfers via unsecure FTP. If someone wanted to, it wouldn't be too difficult to connect a capture device to someone's phone line (assuming they use a modem to connect to the Internet) and steal an electronic copy of the data exchanged on the Internet. Even if you make your purchase on a secure web site supporting the latest security features, it has been recently shown that secure sites can cause Internet Explorer (and other browsers) to send sensitive information to a non-secure server in plain text format.
  • The point is, there are a lot of security issues related to a network such as the Internet. No FAQ could possibly cover them all. That is why this FAQ concentrates on Internet Explorer. Because there are millions of people who use Microsoft Windows family products, and because those millions have the ability to blend Internet Explorer with these products, the seriousness about security should be of paramount importance to everyone. Remember,  software products are only as secure as the environment in which they operate.
  • ...2 more annotations...
  • What Security Features does Internet Explorer Have? Internet Explorer is a safe browser in many ways. The latest version of IE supports Secure Socket Layer (SSL) 2.0/3.0, Private Communication Technology (PCT) 1.0, CryptoAPI, and VeriSign certificates, and one version employs 128-bit encryption, one of the strongest forms of encryption that's commercially available for use over the Internet. To see if you have the 128-bit version of Internet Explorer, go to the Wells Fargo Bank site and take their browser test. "Secure Socket Layer (SSL) is a Netscape-developed protocol submitted to the W3C working group on security for consideration as a standard security approach for World Wide Web browsers and servers on the Internet. SSL provides a security "handshake" that is used to initiate the TCP/IP connection. This handshake results in the client and server agreeing on the level of security they will use and fulfills any authentication requirements for the connection. Thereafter, SSL's only role is to encrypt and decrypt the byte stream of the application protocol being used (for example, HTTP). This means that all the information in both the HTTP request and the HTTP response are fully encrypted, including the URL the client is requesting, any submitted form contents (such as credit card numbers), any HTTP access authorization information (usernames and passwords), and all the data returned from the server to the client." -- Microsoft's IIS 1.0 Features Tour. It has been reported, however, that SSL has been cracked. Private Communication Technology (PCT) is a Microsoft-developed security protocol available in IE only. According to their Internet draft, "The Private Communication Technology (PCT) protocol is designed to provide privacy between two communicating applications (a client and a server), and to authenticate the server and (optionally) the client. PCT assumes a reliable transport protocol (e.g., TCP) for data transmission and reception. The PCT protocol is application protocol-independent. A "higher level" application protocol (e.g., HTTP, FTP, TELNET, etc.) can layer on top of the PCT protocol transparently. The PCT protocol begins with a handshake phase that negotiates an encryption algorithm and (symmetric) session key as well as authenticating a server to the client (and, optionally, vice versa), based on certified asymmetric public keys. Once transmission of application protocol data begins, all data is encrypted using the session key negotiated during the handshake." IE also supports server and client authentication by using digital certificates to identify users to web servers. In addition, IE supports code signing with Authenticode, which verifies that downloaded code has not been modified. For more information on Authenticode, visit Microsoft's Authenticode page or the excellent Authenticode FAQ page. CryptoAPI 1.0 provides the underlying security services for the Microsoft Internet Security Framework. CryptoAPI allows developers to integrate cryptography into their applications. Microsoft has given a great deal of thought to the issue of security and it products, and Internet Explorer 4.0 is no exception. From "Security Zones" to continued support and refinement of Authenticode, IE4 promises to be one of the safest browsers of all time.  You can read all about the security available in IE 4 at http://www.microsoft.com/ie/ie40/?/ie/ie40/features/ie-security.htm. Also, check out what Microsoft is doing to keep transactions private with IE 4.
  • What are "Cookies?" Cookies are small text files that are sent to web browsers by web servers.  The main purpose of cookie files are to identify users and to present customized information based on personal preferences.  Cookie files typically contain information such as your name (or username), password information, or ad-tracking information.  There is a good body of literature on  the Internet about cookies.  Despite what you may have read or heard, most people, including myself, do not view cookies as any kind of a security threat.  However, because of the way cookies work (e.g., a web server storing a text file on someone's hard drive), Microsoft (and other browser manufacturers) have built options into their browsers that notify users when cookies are being passed to them, and give the user an option to prevent the cookie from being accepted.  I don't think this is a good idea.  By rejecting cookies, your browser may not display the entire page or the site may not function as intended. The reality is that cookies are text files -- they cannot contain viruses or execute applications, they cannot search your hard drive for information or send it to web servers, and most of the information they contain is simple tracking information designed to effect better customer service.
  •  
    safe things to do on the Internet and what to learn that is big
Vicki Davis

Online, teachers walk a fine line | floridatoday.com | FLORIDA TODAY - 0 views

  • And some districts -- from South Dakota to New Jersey -- are starting to limit what teachers can do on the sites.
  • "It is the responsibility of all individuals associated with the Foundation to act in a manner that will ensure the public's trust as well as the trust of colleagues and peers.
  • he has heard that some teachers have "risqué" photos on their accounts, but he hasn't actually seen any.
  • ...2 more annotations...
  • Last month, district officials investigated an e-mail from an unidentified "concerned parent" that included pictures of a woman clad in only a bra and underwear. The photo allegedly was taken from a Sunrise Elementary teacher's MySpace page. The teacher was not identified, and the photos did not show the woman's face.
  • "Teachers are role models, and they don't stop when school gets out," said Credle, whose daughter attends Lockmar Elementary in Palm Bay. "If you don't want people to see it, why post it? Odds are it's going to get out."
  •  
    Teachers have a different standard. It is fascinating to read this newspaper article and also the responses. Our students on Flat Classroom project and Digiteen will be reviewing this information because teachers are held to a higher standard online.
Julie Lindsay

Why digital citizenship's a hot topic (globally) | NetFamilyNews.org - 1 views

  •  
    different definitions around the world
Riya P

Parents' Perspectives of technology - 0 views

  • Studies now show a link in electronics and ADHD/ADD. What kids really need in face time with mom and dad
  •   There is a time and place for technology, but to rely on it to "babysit" our children is not the answer.
  • Technology is training our kids to expect results now.
  • ...1 more annotation...
  • Allowing our children access to technology at an early age in their development has it's pros and cons
  •  
    Different perspectives from parents and their kids' technology usage
Merritt D

Parents vs Facebook - 1 views

  •  
    The controversial between Facebook crossing the line or being "ok"! A teenage girl goes on FB after coming home past her curfew and drunk. She get grounded for 5 weeks (no friends or parties) ! She goes and makes a petition on FB (1,000 likes to get her ungrounded") Some teenagers amaze me with how stupid they can be online! Don't ya think that the page would infuriate her parents more instead of arguing her "point"?! Teens like her are the reason good parents are so strict about the internet! Quote: "Facebook is not appropriate." opinions.... they go different ways... this is major conflict!
WestR WHSB

Fair Use Teaching Tools | Center for Social Media - 0 views

  •  
    used for teaching fair use to students "these clips allow students to practice explaining why something is fair use" "you could divide the class into groups and have every group discuss the same scenario and then come back together to see if groups agree. Or you could divide up the class and give every group a difference scenario to discuss. The groups could then report back and see if their classmates agree or disagree with them. Finally, you could choose one scenario and divide the class in half. Have one group argue for fair use and one argue against fair use. Whose argument is stronger and what does the class ultimately believe is the right answer? " "Have them give any and all arguments that they think explain why the video is fair use. "
  •  
    "The Center for Social Media has created a set of teaching tools for professors who are interested in teaching their students about fair use. The tools include power points with lecture notes, guidelines for in-class discussions and exercises, assignments and grading rubrics." the center of social media has created a set of teaching tools for teacher to teach their students about fair use.
Johnny H

Copyright Website - 0 views

  •  
    "Copyright protects creative expression that has been reduced to a tangible form, such as a book, piece of recorded music, computer program, screenplay, painting, photograph, or motion picture." this website tells what copyright is and what it protects and tells the difference between copyright, trademark, and patent by using a Vin diagram
Sage S

Are Your Tech Habits Hurting Your Grades? - NYTimes.com - 0 views

  •  
    As teenagers we are always faced with certain distractions and time-wasters, but our cell phones, social networking places, and other technology are by far the worst. It is proven that it is more powerful for younger people because our brains are just now developing and can easily be habituated. When you are trying to do your homework and you hear your phone beep alerting you that you have a new text message, what do you do? Continue studying or rush to you phone to check this new message? If you rush to your phone, it might be time to try to set a limit on your use of technology. Quote; "The worry is we're raising a generation of kids in front of screens whose brains are going to be wired differently." - Michael Rich, an associate professor at Harvard Medical School and executive director of the Center on Media and Child Health in Boston.
« First ‹ Previous 61 - 80 of 119 Next › Last »
Showing 20 items per page