Skip to main content

Home/ Digiteen/ Group items tagged for

Rss Feed Group items tagged

William B

Top 10 Cases of Extreme Game Addiction - 1 views

  • Video games can be very addicting; in fact, some people accuse developers of making the games addictive on purpose. The following are 10 cases of video game addiction that get more and more extreme. 10 Skipping School I’ve skipped school before, but this kid takes the cake for the most elaborate excuse. A 15-year-old from Perth, Australia, skipped school to play online games for over 16 hours a day, over a full three weeks. How did he do this? Every morning he put on his school uniform until his mother went to work. As soon as she left, he would change out of it and started playing. His mother would return home after he was supposed to have come home from school. To cover for himself at school, he had informed the school he was having surgery. His parents finally caught on to his ruse when the school contacted them to check up on him. 9 Teen Burns Classmate How many of us have gotten into a schoolyard scuffle? We’ve all been there, but a boy in Beijing took it to the next level. Apparently having lost himself in the game, World of Warcraft, he “became” a fire mage in his mind, and set his classmate on fire. For those who don’t play World of Warcraft, I’m sure it’s fairly easy to deduce what a fire mage does by putting two and two together. 8 Fifty-Hour Starcraft Session I’ve pulled all-nighters before while playing games, but a man in South Korea almost pulled off three all-nighters…in a row. After a 50-hour Starcraft session, the South Korean man collapsed and died from heart failure. It was presumed that his death was caused by exhaustion, because he had only stopped to use the washroom and for short periods of sleep. There have been other cases in China where people have been playing anywhere from 3 to 15 days. However I chose to include this one because it received attention from a major news agency. 7 Suicide over a Game On December 27, 2004, Xioyi left a suicide note saying he wanted “to join the heroes of the game he worshiped.” The thirteen-year-old then jumped off a tall building after playing World of Warcraft for 36 hours straight. His parents are now suing the Chinese distributors of the game for $12,500. 6 Girl Dies Because of Neglect A three-year-old South Korean girl died of neglect when her parents spent more time raising a virtual girl than her. The game they had been playing was Prius Online, a game similar to Second Life where players work virtual jobs and well… live a second, virtual, life. The couple had left for a 12-hour gaming session at an internet café, leaving their daughter unattended. Upon returning home, they found her dead. googletag.display('div-gpt-ad-1350520431768-2');
  •  
    Video games can be very addicted. It can cause people to hurt themselves and kill themselves because they are so addicted. Many people eat so addicted to a game they only care about the game and nothing else. "Video games can be very addicting; in fact, some people accuse developers of making the games addictive on purpose. The following are 10 cases of video game addiction that get more and more extreme. 10 Skipping School skipping school.jpg I've skipped school before, but this kid takes the cake for the most elaborate excuse. A 15-year-old from Perth, Australia, skipped school to play online games for over 16 hours a day, over a full three weeks. How did he do this? Every morning he put on his school uniform until his mother went to work. As soon as she left, he would change out of it and started playing. His mother would return home after he was supposed to have come home from school. To cover for himself at school, he had informed the school he was having surgery. His parents finally caught on to his ruse when the school contacted them to check up on him. 9 Teen Burns Classmate firemage.jpg How many of us have gotten into a schoolyard scuffle? We've all been there, but a boy in Beijing took it to the next level. Apparently having lost himself in the game, World of Warcraft, he "became" a fire mage in his mind, and set his classmate on fire. For those who don't play World of Warcraft, I'm sure it's fairly easy to deduce what a fire mage does by putting two and two together. 8 Fifty-Hour Starcraft Session starcraft-2-logo.png I've pulled all-nighters before while playing games, but a man in South Korea almost pulled off three all-nighters…in a row. After a 50-hour Starcraft session, the South Korean man collapsed and died from heart failure. It was presumed that his death was caused by exhaustion, because he had only stopped to use the washroom and for short periods of sleep. There have been other cases in China where people have bee
Miller S.

How Adult Learners are Using the Internet - 0 views

  • Adult literacy/basic education/ESOL students are beginning to use the Internet. An increasing number are very interested in using it for a wide range of purposes: for learning (e.g. to improve reading and writing skills, or take a course;) to access a wide variety of information (e.g. information about the weather, health, travel, other cultures, American news, and -- in the case of ESOL students -- news from their native countries;) for classes at school; for shopping; to communicate with friends, family members, other students, or key pals; for entertainment; for virtual travel; and for the sense of control and power one can feel when using a computer and the Internet. Adult students appear to experience many of the same kinds of difficulties in using the Internet that their teachers do: problems getting access and getting online; having the system crash for a variety of reasons; difficulty figuring out how to navigate online; problems with online and hardcopy instructions; finding out-of-date information at sites; and reading on-screen. Some students also cited problems with their keyboard skills.
    • Miller S.
       
      Adults using the internet
  •  
    Adult literacy/basic education/ESOL students are beginning to use the Internet. An increasing number are very interested in using it for a wide range of purposes: for learning (e.g. to improve reading and writing skills, or take a course;) to access a wide variety of information (e.g. information about the weather, health, travel, other cultures, American news, and -- in the case of ESOL students -- news from their native countries;) for classes at school; for shopping; to communicate with friends, family members, other students, or key pals; for entertainment; for virtual travel; and for the sense of control and power one can feel when using a computer and the Internet. Adult students appear to experience many of the same kinds of difficulties in using the Internet that their teachers do: problems getting access and getting online; having the system crash for a variety of reasons; difficulty figuring out how to navigate online; problems with online and hardcopy instructions; finding out-of-date information at sites; and reading on-screen. Some students also cited problems with their keyboard skills.
hannah h

Internet Collaboration: Good, Bad, and Downright Ugly - 0 views

  • Tips for Effective Internet Collaboration
  • in order to make the most of an often bad situation, I offer eight tips for effective Internet collaboration. These tips were developed based on my experiences over the past
  • While
  • ...14 more annotations...
  • c communication re
  • I believe strongly that electroni
  • mains a poor substitute for face-to
  • -face communication, I also realize that some collaborative projects would n
  • t be practical without it. So,
  • ew years with groups that follow them and
  • th groups
  • with groups that don't.
  • 1. Appoint a single leader or a small group of leaders who are responsible for making sure everything runs smoothly. These leaders need not have any decision-making authority, but they should have administrative responsibilities such as: keeping debates on topic, setting and enforcing deadlines, maintaining the group mailing list, and keeping a group archive. They should also be willing to serve as a resource and answer questions from group members so that these questions need not clog the mailing list. These leaders must be diligent about carrying out their responsibilities and should seek assistance should they find themselves over burdened. 2. Establish a no flame policy for your group. Flame wars are destructive to just about any collaborative effort. Group leaders should make a point of not involving themselves in flame wars, even if they are the target of a flame. They should also gently remind other group members of the policy. Some groups may wish to give a leader the authority to remove group members who repeatedly engage in flame wars. 3. Establish a policy of open communication between all group members. Members should keep everyone informed of the progress they have made i
  • n carrying out their responsibilities. If someone is havin
  • Establish
  • trouble completing a task they volunteered to do (due to lack of time, lack of expertise, or any other reason), they should inform other group members. If some group members communicate privately about a group matter, they should inform the rest of the group about the outcome of their discussion (being careful to say ``we recommend'' rather than ``we decided'' unless the group has given them the authority to make the decision). It is especially important for anyone in a leadership position to communicate with other members and make sure that the members are communicating with each other. 4. Establish a mission statement and set of operating procedures for your group. Depending on the size of your group and the duration of your project, this may be a short list of ground rules or a formal constitution. You should have guidelines and rules that cover the responsibilities of the leaders, the responsibilities of members, procedures for making decisions (including what to do in the event of a deadlock), procedures for appointing and expelling group members or leaders, and procedures for changing these rules. When working on a long-term, open ended project it is best to keep the ground rules somewhat flexible so that unanticipated ideas are not precluded and new group members don't feel stifled by a framework established by members long-retired. 5. Whenever a new and likely controversial topic is introduced to the group, have people respond to the original poster rather than to the entire mailing list. Then have the original poster collect all the responses into a single message (and if possible prepare an executive summary) and send that back to the group. You may want to repeat this for several rounds of discussion before opening the topic up for general debate. The idea here is to put all the issues on the table at once so that people don't start a debate before they have all the facts and a general understanding of the concerns of other group members. 6. Hold periodic virtual meetings. This can be done through a conference call, audio or video online conferencing software, an online chat room, or even an agreement that everyone will be online and checking their email at a specified time. Any of these formats should allow for a more or less synchronous debate followed, if necessary, by a vote. 7. If your group has trouble making decisions and is unable to get group members together for a virtual meeting frequently enough, try resorting to an electronic equivalent of Roberts Rules of Order in which the rules of debate are spelled out in great detail. (The nice thing about Robert's Rules is that they have been well established and thus groups can agree to adopt them without arguing over what they should be. Adopting a set of electronic rules for debate may be tricky if your group has to write these rules from scratch. But you may be able to get your group members to agree t
  • o adopt a set of rules written by
  • subcommittee or a neutral party.) Such rules might include the maximum amount of time allowed for a debate before a vote must be taken, the amount of time members have to submit their votes, and the maximum number of words or separate email messages a member may send to the mailing list on a particular topic. I see this mostly as a method of last resort, and I don't recommend writing this into the group's constitution or ground rules unless you've tried it and found it to be effective. 8. Try to find ways for as many of your group members as possible to meet in person. Ideally you would fly everyone to a central location for a group retreat. But financial concerns often don't allow for such luxuries, so do the best you can. Encourage group members to visit their geographically closest neighbors in the group and to meet other members at conferences or when traveling. The more group members get to know each other, the easier collaboration will be. If possible, try to get the entire group together at the beginning of the project and at the end of the project (or for a lengthy project, after every major phase of the project has been completed). Getting the entire group together at the beginning will help the group establish a common sense of direction. Meeting at the end or after the completion of a major phase will provide a sense of closure and an opportunity for group members to evaluate what they have done.
  •  
    This is some collaboration tips.
Kelby W

Privacy Tips - 0 views

  •  
    Not all websites are trust worthy. Here are some tips to help be a little more safe with your privacy online. "TIP #1: Do Some New Year's (Data) House Cleaning Get New Passwords: Use different, strong passwords for each of your online accounts so if one is compromised the rest are safe. Strong passwords contains letters, numbers, different cases, and symbols. Check your password's strength here. Close Old Online Accounts: Unused online accounts are a liability. Hackers could use them to infiltrate your more important accounts . Get rid of them. If you can't remember where you have old accounts search your email inbox with queries like "registered", "confirm" or "your account" to find email records of old accounts. Cull Your Friends List: You put a lot of information about yourself on social networks. Would you want that friend of a friend you met once, two years ago to be carrying around a physical copy of all that information? Probably not. Keep the people you know and trust. Delete the rest. Go Paperless: Still receiving bank statements and doctors' invoices by mail? You don't need your Social Security number floating around in your trash can on the curb outside. Call your bank, doctor, credit card company etc. to find out if you can go paperless and manage your records via a secure online portal. You'll save a tree and protect your privacy. Shred Sensitive Documents: Those credit card and health savings account statements you don't need that have been sitting in that folder in your desk? They're a privacy liability. Get rid of them (securely, using a shredder). Privacy Tips Browser Privacy  Back to top Web browsers have evolved into highly customizable software platforms capable of controlling and protecting much of the information that flows between you and the parties you interact with online. Modern browsers have an impressive array of privacy enhancing capabilities and options. They can, for example, warn you before you visit suspicious or fraudul
wildcat wildcat

digiteen2008 - Digital Etiquette - 3 views

  • Good etiquette is shown by having a proper education, manners and a sense of tact.
  • Etiquette mainly appears when someone has guests, meets with other people, or during meals.
  • Etiquette: Key terms Etiquette: rules governing socially acceptable behavior. Propriety: correct or appropriate behavior. Manners: a polite or well bred social behavior or habits Proper: marked by suitability or rightness or appropriateness. Education: the activities of educating or instructing; activities that impart knowledge or skill. Respect: an attitude of admiration or esteem. Civilized: having a high state of culture and development both social and technological. Social: living together or enjoying life in communities or organized groups. Tact: the ability to speak without offending others. Polite: showing regard for others in manners, speech, behavior. Impression: mental picture: a clear and telling mental image. Cleanliness: the habit of keeping free of superficial imperfections, diligence in keeping clean. Sophisticated: having or appealing to those having worldly knowledge and refinement. Society: an extended social group having a distinctive cultural and economic organization.
  • ...14 more annotations...
  • Digital Etiquette 1. Here is some tips that you should follow when talking online, texting, or emailing: 2. Say Hello before you start talking. It’s polite and it can make somebody happy knowing that somebody is nice enough to say hello. 3. Try to avoid replying “Sure”. A person will go crazy trying to figure out “Sure” what? Also, depending on who you are talking to online, the person may know little of your language and might not understand what you are saying, so be patient. 4. Avoid trailing off. If you stop responding to somebody all of the sudden they might think you’re ignoring them. If you have to go and do something say “BRB” or “one sec”. It will calm any worries, which the person has, who you are communicating to. 5. Don’t post people’s photos without their permission. Somebody might have a religion where they're not allowed to have they're pictures online. 6. Accept differences. Everybody has different beliefs. Don’t make fun of somebody’s religion or country because people can really get offended about what you say. 7. Talk about things that are appropriate. Chat rooms are for anyone who wants to talk to new people. One inappropriate comment can ruin it for everyone. You should always be aware to whom you are talking to and if they ask you to do anything which you feel uncomfortable about then tell an adult immediately so then the problem won't get out of hands. 8. Say bye before you leave the person whether its in person or online. You could seriously hurt somebody’s feelings if you just stop talking to them. 9. Be careful the way you type something. What you write can sound very different than what you mean. Read your writing before you press send. It could save you from an embarrassing situation. 10. Avoid writing in all capital letters. It looks like you're shouting. Wouldn't you think I was shouting if you saw this, DON'T WRITE IN ALL CAPITAL LETTERS.
  • Access Communication Literacy Student Environment Security and Safety Etiquette Rights and Responsibilities Student Life Outside Commerce Law Health and Wellness Class Actions American School of Madrid Spain Anand Vidya Vihar India Aspengrove School Canada Badshah Faisal Islami Institute Bangladesh La Grange USA Pahartali Girls High School Bangladesh Rani Bilashmoni Govt. Boys High School Bangladesh Troy Middle School USA Qatar Academy Qatar Wedderburn College Australia Westwood Schools USA Information Social & Ethical Issues Rubrics Teachers Template sj32 · My Wikis · · My Account · Help · Sign Out · Digital Etiquette page Details and TagsPrint PDF Backlinks Source Delete Rename Redirect Permissions Lock discussion (39) history notify me Details last edit Friday, 12:46 pm by kcaise - 124 revisions Tags none Type a tag name. Press comma or enter to add another. Cancel Table of ContentsDigital Etiquette 1. Overview/Description of the various aspects of the topic. Elementary Aged Students Middle/ High School Aged Students Email Etiquette: BE A SPORT, AND KEEP IT SHORT: NON MIND READERS FRIENDLY, PLEASE!: graTipos and.grammar! can caus cauz ishueezz? (typos and grammar... can cause issues!) BUISNESS FOR BUSYNESS!!! BE PLASTIC-ON-THE-SCREEN-CLEAR!!! A
  • Digital Etiquette or netiquette is a basic set of rules you should follow to make the internet a better place for other people and yourself.
  • When you instant message, chat, or email someone over the internet, that person can't tell if your just joking because they can't see your face. Don't say stuff over the internet that can be taken the wrong way or can hurt someones feelings
  • The internet takes over some peoples lives and people can get brain washed so easily when on the computer. Hacking other computers, using bad language, downloading illegally, and plagiarism are examples of having bad or no etiquette when it comes to the internet.
  • Etiquette is a set of rules dealing with exterior form
  • Middle/ High School Aged Students Teenagers these days are only on the internet to chat with their friends they know, or to look at cool videos or pictures.Myspace and Facebook are easy ways for teenagers to get access to the internet. These two websites have caused a lot of controversies over the internet because some teenagers will put bad pictures on the internet of themselves or other people. Every once in a while fights will occur between people who are trying to make each other look bad. It gives them a bad reputation and it ruins friendships all over the world. I just think that if teenagers would act mature then a lot of these things would not happen.
  • Online plagiarism is where internet users copy or use part of your or someone else's work. It is definitely not acceptable and is becoming a major issue. People need to have the right to place information on the internet knowing that it will not be copied for other people's work. Plagiarism is illegal but people still don't get the message. Plagiarism really could start major problems like people not writing the truth on the internet or making up information just to teach people a lesson. If someone is going to copy other people's work really they are better off handing the work in late or not at all. Using people's ideas is okay if you give them recognition or asked them. Plagiarism is equal to lying, if not worse. People are being generous by putting their knowledge on the internet to help people not to do it for people. Have courtesy and respect- don't copy peoples work use it as a guide and acknowledge them for their work and help. Plagerism- it's illegal so do the right thing.
  • ownloading illegally is one of the things not do in digital etiquette. Using file sharing programs such as KaZaA, Bit Torrent, iMesh, and Lime Wire to share or obtain copyrighted music, movies, games, and other software without the permission of the copyright holder is illegal. Stealing music has lots of effects once done. Some of the effects are listed below. Stealing music is against the law. Stealing music betrays the songwriters and recording artists who create it. Stealing music stifles the careers of new artists and up-and-coming bands. Stealing music threatens the livelihood of the thousands of working people—from recording engineers to Christian music retailers and their staffs —who are employed in this ministry.
  • Downloading Illegally
  • Some ways on avoiding stealing music are: Read user agreements carefully. Check the Web sites of the musicians, record companies, or movie studios to see if they allow distribution of their materials on the Internet. When purchasing music, movies, games, software, or other materials, read the license carefully to learn if you have permission to convert materials to other formats for personal use. Don't share or distribute materials unless you have permission. Of course, there are consequences to this kind of action. For one you can be fined of at least $500 dollars. The online infringement of copyrighted music can be punished by up to 3 years in prison and $250,000 in fines," the website said. "Repeat offenders can be imprisoned up to 6 years. Individuals also may be held civilly liable, regardless of whether the activity is for profit, for actual damages or lost profits, or for statutory damages up to $150,000 per infringed copyright. " To avoid these kinds of consequences you must avoid downloading illegally. I suggest that you follow the ways on avoiding these sort of consequences.
  • Some people have had both positively and negatively affected by internet etiquette. An example of negative etiquette on the internet is like if a person copies somebody's work without their permission and then the person who got copied goes and deletes that person's work
  • Don't type in all caps it looks like you're shouting which can offend some people which are on the other end of the computer because when you are talking to a person in face its easier to get your point across than talking online. Also if you try to do humor on the computer someone might not know that it is humor, and might take it as personal and you can get in trouble in all sorts of ways. Another thing is don't send rude messages or offensive e-mails to one another. It bad manners and it can get way out of hand in no time. Although you might be a pro at cyberspace be nice to the new comers. For a new comer on computers it is like learning a different language for them. Computers take a lot of practice and it is also called for mistakes. So be nice to everyone you meet and also try to help them if you can.
  • Another example is if you do something very funny and one of your friends got you on video tape and he goes and posts it on YouTube
  •  
    What etiquettet is
  •  
    "Digital Etiquette or netiquette is a basic set of rules you should follow to make the internet a better place for other people and yourself"
Phil Macoun

Bookmarks - 42 views

Wow. This is going to be a steep learning curve for me, I have a Diigo account but haven't used it much. Vicki I'm unclear how this will work. Are you saying that we should tag each of our bookm...

digiteen

Becca B

Top Five Netiquette Rules in an Online Course (or Anywhere) for Success - 0 views

  •  
    "1- Be friendly, positive and self-reflective. When people cannot see you, and also do not know you, feelings can be hurt if you are not careful in how you express yourself. The old saying, think before you speak is important here. Think before you write. One word of advice is do not respond when you feel angry. Wait. Write it down somewhere and come back to it. When you do, you may find that you no longer feel the same way as you did when you wrote it, because you have had time to reflect about the situation. Last, if you still feel the need to be heard, then edit before you post, and write it in terms that are easily embraced. This is also true when you feel a critique is necessary, say it in a positive tone. Reread what you have written to be sure it is positive. 2- Use proper language and titles. Do not use slang or even profane words in an online education environment, even if they are words you consider, "not so bad," as they will sound offensive to the reader. Do not refer to your professor as "Doc" or by his or her first name, unless it is acceptable with him or her to do so. Also, do not use caps lock when writing. It will insinuate yelling. That would hurt someone's feelings and possibly give him or her the wrong impression of you. 3- Use effective communication. This takes practice and thoughtful writing. Try to speak and write clearly at all times. Again, reread before you respond. Define and restate your words when necessary. Correct a misunderstanding right away. Chances are, if one person felt a certain way about what you said, then another may have as well. Likewise, be mindful of chosen words and joking. Let's say for example, I write, "get out!" This slang term can be interpreted in several ways, either positively or negatively. 4- Professionalism. Leave the characters like smiley faces, and instant message abbreviations out. Your friends may like it, but chances are, your professor will not. Save it for personal conversations or definitely ask
Maggie B

Nine Elements - 3 views

  • one has the opportunity to communicate and collaborate with anyone from anywhere and anytime. Unfortunately, many users have not been taught how to make appropriate decisions when faced with so many different digital communicatio
  • communicate with other people. In the 19th century, forms of communication were limited. In the 21st
  • Digital Citizenship
  • ...23 more annotations...
  • citizenship can be defined a
  • to create rules and policy, we must teach everyone to become responsible digital ci
  • l uncomf
  • ic standards of conduct or procedure. Technology users often see this area as one o
  • oral goods and services are surfacing such as pornography and gambling. Users need to learn about how to be effective consumers in a new digital economy. 
  • t economy is being done electronically. Legitimate and legal exchanges are occurring, but the buyer or seller need
  • n electronic society. All people should have fair access to technology no matter who they are.  Places or organizations with limited connectivity need to be addressed as well.  To become productive citizens, we need to be committed
  • norms of appropriate, responsible behavior with regard to technology use. 
  • 1.   Digital Access:   full electronic participation in society. Technology users need to be aware of and support electronic access for all to create a foundation for Digital Citizenship.
  • s the
  • Digital
  • 2.   Digital Commerce:   electronic buying and selling of goods. Technology users need to understand that a large share of marke
  • 3.   Digital Communication:   electronic exchange of information.
  • One of the significant changes within the digital revolution is a person’s ability to
  • offer a wide variety of choices (e.g., e-mail, cellular phones, instant messaging).  The expanding digital communication options have changed everything because people are able to keep in constant communication with anyone else.
  • n options.
  • 4.   Digital Literacy:   process of teaching and learning about technology and the use of technology. While schools have made great progress in the area of technology infusion, much remains to be done. A renewed focus must be made on what technologies must be taught as well as how it should be used.
  • 5. Digital Etiquette:   electron
  • 9.   Digital Security (self-protection):   electronic precautions to guarantee safety.
  • We need to have virus protection, backups of data, and surge control of our equipment. As responsible citizens, we must protect our information from outside forces that might cause disruption or harm.
  • Digital Law:   electronic responsibility for actions and deeds
  • Digital Rights & Responsibilities:   those freedoms extended to everyone in a digital world
  • Digital Health & Wellness:   physical and psychological well-being in a digital technology world.
  •  
    Most people make the wrong health decisions. When they make these decisions, they mess up their whole life. Online health is the same. If you mess up there, you mess up your life.
  • ...2 more comments...
  •  
    "Nine Themes of Digital Citizenship Digital citizenship can be defined as the norms of appropriate, responsible behavior with regard to technology use. 1. Digital Etiquette: electronic standards of conduct or procedure. Technology users often see this area as one of the most pressing problems when dealing with Digital Citizenship. We recognize inappropriate behavior when we see it, but before people use technology they do not learn digital etiquette (i.e., appropriate conduct). Many people feel uncomfortable talking to others about their digital etiquette. Often rules and regulations are created or the technology is simply banned to stop inappropriate use. It is not enough to create rules and policy, we must teach everyone to become responsible digital citizens in this new society. 2. Digital Communication: electronic exchange of information. One of the significant changes within the digital revolution is a person's ability to communicate with other people. In the 19th century, forms of communication were limited. In the 21st century, communication options have exploded to offer a wide variety of choices (e.g., e-mail, cellular phones, instant messaging). The expanding digital communication options have changed everything because people are able to keep in constant communication with anyone else. Now everyone has the opportunity to communicate and collaborate with anyone from anywhere and anytime. Unfortunately, many users have not been taught how to make appropriate decisions when faced with so many different digital communication options. 3. Digital Literacy: process of teaching and learning about technology and the use of technology. While schools have made great progress in the area of technology infusion, much remains to be done. A renewed focus must be made on what technologies must be taught as well as how it should be used. New technologies are finding their way into the work place that are not being used in schools (e.g., videoconfer
  •  
    9 elements to digital citizenship
  •  
    In order for students to be achieve digital citizenship, we must know how to communicate properly.
  •  
    Nine Themes of Digital Citizenship Digital citizenship can be defined as the norms of appropriate, responsible behavior with regard to technology use. 1. Digital Access: full electronic participation in society. Technology users need to be aware of and support electronic access for all to create a foundation for Digital Citizenship.
Brody C

digiteen2008 - Digital Security and Safety - 0 views

  • Middle/ High School Aged Students A lot of middle and high school students are members of websites like Myspace and Facebook. To some teens, these websites become addictive and they become so obsessed with talking to people that they start talking to anybody. They need to learn to not put personal information on their page like their phone number or their address because some of the people who look at that would want to hurt them. Another problem with teens is that some of them download illegal music and videos. Two of the most common sites are Frostwire and Limewire. Another thing some teens do is download free software and then their computers run really slow. That's because spyware is usually packaged with the free software. Three ways to keep your computer safe is "only download free software from reputable sites, kids and teens should be told to ask permission before downloading anything, and you can eliminate most spyware by downloading the free Microsoft Windows Defender and scanning your PC." [2]
  • Many people don't realize how important it is to have a secure password. A password is like a key to the door of your personal space on the internet. It is extremely important to keep your password safe. Some ways to choose a secure password are to use a word(s) that is totally unrelated to you. DO NOT use your maiden name, your dogs name, your phone number, your birthday, or any other things that could be related to you. A word on its own isn't very strong, so to increase strength you can add numbers and or symbols. An example of this is if you use the word " apple ", on its own it won't be very secure. If you were to put some numbers and symbols, then it would make it " apple321 " and it would be more secure. If you were to make some of the lower case letters capitals, "aPpLe321 " then it would be even stronger. If you wanted the most secure password possible, then you could insert some symbols, making it " (aPpLe321) "After 30-60 days of using the same password, it would be wise to alter or change your password. You should also use different passwords for different applications. If you would like to test your password, click here
  • 2. How safety and security positively and negatively impacts people How safety & Security positively impacts people you can know where you can rely on some of the website or blogs you feel comfortable to talk to each other sometimes when you are in a reliable website you don't have to tell every single thing about yourself to people online How safety & Security negatively impacts people sometimes strangers can put weird/inappropriate pictures online of you in other sites without your permission you may accidentally reveal your personal information to other strangers and might get in danger people sometimes bully other people they don't know sometimes, the predators make websites to attack you. They make you think the website is reliable and forces you to tell them your personal information
  • ...7 more annotations...
  • Cyber Stalking: This one of the most dangerous things on the internet; people every day are blackmailed into giving personal info like Accounts, credit card numbers, and others info. If you receive or see: · Threatening E-Mails · Post showing you differently to destroy your character · Info About your life posted on the internet
  • Middle/ High School Aged Students Teenagers everywhere use blogs such as Myspace and Facebook. They need to be safe and secure while they do these, as online predators with bad intents can find you if you give to much information. We as teens must obey online laws and common sense.When online teens usually disregard things there parents tell them. Sexual and online predators can ruin a person's childhood if they are able to find them. They can also put the wrong ideas into the minds of children, making them unwanted and bad for your health.
  • Middle/ High School Aged Students Teens use Myspace and Facebook to talk to their friends and stuff. Although, others that they don't know just might become interested in them. Online predators try their best to find out where you live. If they do, it can be bad for your health and childhood. On one website, I found a story in which a real life person fell in love with someone on the Internet. It turned out she left with him for a while and it turned out he was a sexual predator. Always be safe on the Internet.
  • Middle/ High School Aged Students One possible solution is to be safe while blogging. Also, never have a personal meeting. Never include your full name, address, or school, as they can look up your name and find you. Never put pictures online that could help online predators find you. If someone who talks to you online does not seem right or makes you nervous just stop talking to them and tell an adult. Just let them handle it because they are smarter and wiser in those kind of situations.
  • B. Middle / High School Aged Students Teens need to be safe and never give out information Be careful what they download. Be their selves because they don't need to be what they're not. Not talk to strangers.
  • Blogging Tips for Teenagers Being safe on blogs and other websites is very important. I have found some tips to help us be safer on the Internet, which is an important part of a teenager’s everyday life. The first way to be safe is to avoid posts that enable online predators to find and locate you. This means to not give information out like where you go to hang out, your name (last name especially), where your school is and its name, and especially where you live, because everybody can see what you write including the predator. Most people don't know this, but if you give out your phone number, than anybody, including a predator, can type your phone number into google and then they can see where you live. This helps a predator lead straight to you. If someone asks you for private information, DO NOT give it to them. It should be a red flag for you to ignore him or leave the chat room. Also, in chat rooms, if you feel something is going wrong and you feel uncomfortable with anything, leave the chat room immediately. Never have your screen name the same as a nick name. Online predators can sometimes track you down by screen names, which are private unless you give them out. Remember, if your going to have a blog or belong to a chat room, be safe and follow the rules. Also if you find something abnormal online, tell an adult you know and someone you can trust 100%. Always be yourself when on an online blog, which means never put fake information about yourself. In addition, always be respectful to others. If you write a bad comment, it might come back to you. Also, don’t put many pictures about yourself unless you can trust who your sending pictures to. It only helps online predators having a picture of you. Never, never have an in-person meeting. You never know if the person you are meeting has bad intentions. Be honest about your age. If there is an age limit on a chat room then there is probably a reason for one. You never know what you are getting into on the internet. The last tip is that you shouldn't meet anybody without your parent's permission. The reason is because even though you think you know very well the person by catting with them online for few years, it might be the predator that wants to harm you. The predator might told you the false information that he/she is the same age as you or live near your house. So you have to be careful if you are meeting the right person. Adults Although adults are able to have a form of independence, safety and security is very important. They have to be cautious about doing things like online banking or putting personal information online. Adults who put credit card numbers and other personal information should be aware of pharming and phishing. Many adults believe because they are experienced, they know how to be safe. They need to make sure the website they are putting personal information on is secure. You need to look for the "https" at the link of the website. When adults commonly think of online safety they think of online fraud. Identity takers feed off information given out online. If you are a victim of identity fraud it could have an effect on your future. Other than just internet fraud another thing adults have to worry about while online is cyber stalking. Cyber stalking is another way of harassment through the computer. Cyberstalking includes threatening emails, people posting private information about you for others to see, and posing as you online. Many adults seem to feel like they're older so they are less likely at risk for having predators after them. This is not the case. Websites such as eharmony.com and match.com are websites that leave predators open to find people. If you do plan on meeting someone you meet at one of these sites you should make your date at a public place and make sure not to be alone.
  • Digital Security and Safety is an issue that relates to a person's well-being and safety on a computer. Safety and security are two topics that are closely related. Security is the condition of being protected against danger, loss, and criminals. Safety is the condition of being protected against non-desirable events. Some studies have shown "The odds of becoming a cyber victim have dropped to 1 in 6, from 1 in 4 last year.[1] Some examples of potentially unsafe sites online are Facebook and Myspace, which can sometimes can be dangerous because there can be bullying online. On facebook and myspace you can put your picture or pictures on and some people put inapporaite pictures on, which is not safe because thier are always predators out there on the internet and they could see your picture and ask to meet. If you agree to go and meet them then you could be injured.
Garrett E

Why Cell-Phone Health Concerns Persist - 0 views

  • Arjen Witzel Feb 18, 2010 7:07 AM GMT Effects ofexposure to emf radiation/ mobile phone/ wireless and related technology at my body are :Headache Fatigue Stress Sleep disturbances Skin symptoms like prickling, burning sensations, rashes, muscle pains and aches and more.But Doctors can't emplane any of this in Nederland.I lost my lob two times now.And can't start a new one because of my state of health.To keep alive at home i have rebuild my rand house in a cage of Faraday.Outside it 800/2200 uW/m2 from cell-towers and radiated devices from next door.Inside 0,4uW/m2 where i now can sleep properly.Before that impossible to get to sleep.Around me many people have the same problems, and the don't no what is the problem jet!Taking many medicine for nothing just like me in the past.I have nu future any-more. Adam Nov 6, 2009 6:38 PM GMT I have used a number of cell phones over the past 10 years. Its easy for me to say that my eye twitching, localized piercing head aches, tremors, etc are the result of this phone but it can not be proven. I do not have a home phone, I use my cell as my primary phone end never really thought that it may be the cause of head/brain issued until recently. My question... are the blue tooth devices really any better? do they not still pick up and transmit the same waves as the hand held device I have spent so much time holding next to my brain? i wish a few real studies not conducted or funded by the phone companies would surface... we need the help. Virginia Farver Sep 22, 2009 9:45 PM GMT I'm writing in behalf of my Son, Richard Blaine Farver,(Rich). Rich, died of glioblastoma multiforme brain cancer Oct.11,08 at the age of 29. Rich always had his cell phone on his head or in his pocket! Like millions of other kids he had used it for the last several years. His tumor was on the right side of his head, and he was right handed! Rich was also a graduate student at SDSU in San Diego,CA. In March of 09, articles were written about Rich and one other man that died in 2008 from glioblastoma, one died in the 90's from glio, and one is currently battling a malignant brain tumor. The articles are about a particular building and room on SDSU campus. 'Nasatir, room 131.' I found these articles in August 09. I KNOW, cell phone use caused my Son's cancer and the public needs to take this Very seriously! There is a cell tower next to this building, room, also! The, "It won't happen to me," attitude needs to be changed!! Everyone heed my WARNING! It can happen to any one! This has destroyed our lives! Please, I DO NOT want anyone else to endure this, or their families!Sincerely,Virginia Farver
  • been around for over 20 years, and they're now used by more than 3 billion people
  • including cancer
  • ...9 more annotations...
  • "Although the evidence is still controversial, I am convinced that there are sufficient data to warrant issuing an advisory to share some precautionary advice on cell-phone use," wrote Ronald Herberman in a memo to 3,000 faculty and staff in late July.
  • director of the University of Pittsburgh Cancer Institute, who warned school employees to limit their cell-phone use
  • many studies
  • "The overwhelming majority of studies that have been published in scientific journals around the globe show that wireless phones do not pose a health risk," said the Cellular Telecommunications & Internet Assn., the wireless industry's trade group
  • wireless industry, from Nokia (NOK) and Motorola (MOT) to Verizon Wireless and AT&T (T), says there is no cause for concern
  • definitive scientific proof is tough to come by
  • them hard to study
  • mainstream products for only 10 years or so, and it may take much longer than that for adverse effects to show up
  • "The most difficult thing to resolve is whether there is an effect with long-term mobile-phone use," says Rodney Croft, executive director at the Australian Center for Radio Frequency Bioeffects Research.
  •  
    "Mobile phones have been around for over 20 years, used by more than 3 billion people." "can contribute to health problems, including cancer?" director of the University of Pittsburgh Cancer Institute, who warned school employees to limit their cell-phone use based on early unpublished data from scientific studies. "Although the evidence is still controversial, I am convinced that there are sufficient data to warrant issuing an advisory to share some precautionary advice on cell-phone use," wrote Ronald Herberman in a memo to 3,000 faculty and staff in late July. The wireless industry, from Nokia (NOK) and Motorola (MOT) to Verizon Wireless and AT&T (T), says there is no cause for concern. "The overwhelming majority of studies that have been published in scientific journals around the globe show that wireless phones do not pose a health risk," said the Cellular Telecommunications & Internet Assn., the wireless industry's trade group, in a statement following Herberman's memo. Questions that there are adverse effects with long-term mobile phone use.
Becca B

10 Etiquette Tips For An Online Course - 0 views

  • 1.) Participation — unlike classroom settings, you can’t just “show up” and expect to pass the class. An online class is a community, and as such all are expected to participate. Discussion posts, opinions and feedback should be thoughtful and well-articulated so that everyone can enjoy a fun learning experience. 2.) Procrastination — do not wait until the last minute to do your work! Taking an online course means working with technology, and sometimes it can fail you. Work ahead of schedule so that any problems can be taken directly to the instructor for help, without losing time. 3.) Sharing — ideas, opinions and experiences should be shared with the whole community. Classmates may post questions on the Discussion Board, which you may be able to answer. Don’t keep information to yourself; in a community, everyone works together for the good of the whole. 4.) Proofread – before you press the SEND button, think about what you have written; you can’t take it back! A response to a classmate, a discussion post, an email to the instructor, make sure that you have said what you meant and that you mean what you said! 5.) Express — classmates and teachers cannot “see you”, so you have to be clear. Sarcasm, concern and other emotions are lost in an online environment if there is not enough information to back the statement up. 6.) Feedback — give feedback to your classmates and be open to theirs. Online classes function best when everyone is involved in the learning process. 7.) Respect — do not put down anyone’s ideas or thoughts, also state your own opinion in a way that is not hostile or overwhelming. Respect your classmates and they will respect you! 8.) Caution – be careful about statements that may come off as derogatory, racist or inappropriate for the classroom setting. If you wouldn’t say it in person, don’t say it online. 9.) Cheating – treat the class like an in-room course. Do not cheat, it only hurts your learning opportunities. 10.) Work hard! — to get the most out of it, you’ve got to put your best into it! Work hard and achieve results!
  •  
    "1.) Participation - unlike classroom settings, you can't just "show up" and expect to pass the class. An online class is a community, and as such all are expected to participate. Discussion posts, opinions and feedback should be thoughtful and well-articulated so that everyone can enjoy a fun learning experience. 2.) Procrastination - do not wait until the last minute to do your work! Taking an online course means working with technology, and sometimes it can fail you. Work ahead of schedule so that any problems can be taken directly to the instructor for help, without losing time. 3.) Sharing - ideas, opinions and experiences should be shared with the whole community. Classmates may post questions on the Discussion Board, which you may be able to answer. Don't keep information to yourself; in a community, everyone works together for the good of the whole. 4.) Proofread - before you press the SEND button, think about what you have written; you can't take it back! A response to a classmate, a discussion post, an email to the instructor, make sure that you have said what you meant and that you mean what you said! 5.) Express - classmates and teachers cannot "see you", so you have to be clear. Sarcasm, concern and other emotions are lost in an online environment if there is not enough information to back the statement up. 6.) Feedback - give feedback to your classmates and be open to theirs. Online classes function best when everyone is involved in the learning process. 7.) Respect - do not put down anyone's ideas or thoughts, also state your own opinion in a way that is not hostile or overwhelming. Respect your classmates and they will respect you! 8.) Caution - be careful about statements that may come off as derogatory, racist or inappropriate for the classroom setting. If you wouldn't say it in person, don't say it online. 9.) Cheating - treat the class like an in-room course. Do not cheat, it only hurts your learning
William B

Internet and Computer Addiction: Signs, Symptoms, and Treatment - 1 views

  • Computer Addiction – obsessive playing of off-line computer games, such as Solitaire or Minesweeper, or obsessive computer programming.
  • The Internet provides a constant, ever-changing source of information and entertainment, and can be accessed from most smart phones as well as tablets, laptops, and computers. Email, blogs, social networks, and message boards allow for both public and anonymous communication about any topic. But how much is too much Internet usage? Each person’s Internet use is different. You might need to use the Internet extensively for your work, for example, or you might rely heavily on social networking sites to keep in touch with faraway family and friends. Spending a lot of time online only becomes a problem when it absorbs too much of your time, causing you to neglect your relationships, your work, school, or other important things in your life. If you keep repeating compulsive Internet behavior despite the negative consequences in your offline life, then it’s time to strike a new balance.
  •  
    The Internet can be a good thing and a bad thing. some people need the Internet for work. If you are addicted to the Internet you cut you relationships and outside activities out of your life. Addiction to the Internet can damage your health. "The Internet provides a constant, ever-changing source of information and entertainment, and can be accessed from most smart phones as well as tablets, laptops, and computers. Email, blogs, social networks, and message boards allow for both public and anonymous communication about any topic. But how much is too much Internet usage? Each person's Internet use is different. You might need to use the Internet extensively for your work, for example, or you might rely heavily on social networking sites to keep in touch with faraway family and friends. Spending a lot of time online only becomes a problem when it absorbs too much of your time, causing you to neglect your relationships, your work, school, or other important things in your life. If you keep repeating compulsive Internet behavior despite the negative consequences in your offline life, then it's time to strike a new balance."
Brody C

Safety and Security on the Internet - 0 views

  • Why Should I Worry About Security? The Internet is a global collection of Interconnected Networks that facilitate information exchange and computer connectivity. The Internet is comprised of many different computers, all of which fall into two categories: servers (also known as "hosts") and clients (also known as "guests") -- technically, everything on the Internet can be considered a "host," but for this discussion, we'll use "hosts" and "guests." Guest machines send bursts of computer data called "packets" which are analyzed by the server belonging to the guest's Internet service provider. If the data is located locally (on the ISP's machine), the ISP's server will return the packets. If the information sought is not local (on another machine), the ISP's server hands off the packets to a router, which then sends the packets to the server containing the information. Once the information is located, it is sent back to the guest machine. There are many different types of computers that fill these two categories: mainframes, minicomputers, PCs, Macintosh, Unix and others. Despite the many varieties of computers that combine to form the Internet, every computer connected to the Internet needs to be able to communicate with every other computer -- without this ability, there is no Internet. All of these computers are able to communicate because in a sense they can all speak the same language -- TCP/IP. TCP/IP actually isn't a language; it is in computer terms what is known as a "protocol." A protocol is simply a standard for transmitting and receiving bits of information. As long as all of the interconnected computers follow the same protocol, they can exchange information. Unfortunately, when data is sent from one computer to another on the Internet, every other computer in between has an opportunity to see what's being sent. This poses an obvious security problem.
  • Say you decide to purchase concert tickets on the Web. To do so, you need to fill out an electronic form with your name, address and credit card number. When you submit the form, your information passes from computer to computer on its way to the concert ticket web server. It is possible that someone could be watching the data passing through one of the computers that is in between your computer and the concert ticket server. No one knows how often this happens, but everyone concedes it is technically possible. And its also possible off the web, too -- E-mail can be captured (and read, if not encrypted), as can file transfers via unsecure FTP. If someone wanted to, it wouldn't be too difficult to connect a capture device to someone's phone line (assuming they use a modem to connect to the Internet) and steal an electronic copy of the data exchanged on the Internet. Even if you make your purchase on a secure web site supporting the latest security features, it has been recently shown that secure sites can cause Internet Explorer (and other browsers) to send sensitive information to a non-secure server in plain text format.
  • The point is, there are a lot of security issues related to a network such as the Internet. No FAQ could possibly cover them all. That is why this FAQ concentrates on Internet Explorer. Because there are millions of people who use Microsoft Windows family products, and because those millions have the ability to blend Internet Explorer with these products, the seriousness about security should be of paramount importance to everyone. Remember,  software products are only as secure as the environment in which they operate.
  • ...2 more annotations...
  • What Security Features does Internet Explorer Have? Internet Explorer is a safe browser in many ways. The latest version of IE supports Secure Socket Layer (SSL) 2.0/3.0, Private Communication Technology (PCT) 1.0, CryptoAPI, and VeriSign certificates, and one version employs 128-bit encryption, one of the strongest forms of encryption that's commercially available for use over the Internet. To see if you have the 128-bit version of Internet Explorer, go to the Wells Fargo Bank site and take their browser test. "Secure Socket Layer (SSL) is a Netscape-developed protocol submitted to the W3C working group on security for consideration as a standard security approach for World Wide Web browsers and servers on the Internet. SSL provides a security "handshake" that is used to initiate the TCP/IP connection. This handshake results in the client and server agreeing on the level of security they will use and fulfills any authentication requirements for the connection. Thereafter, SSL's only role is to encrypt and decrypt the byte stream of the application protocol being used (for example, HTTP). This means that all the information in both the HTTP request and the HTTP response are fully encrypted, including the URL the client is requesting, any submitted form contents (such as credit card numbers), any HTTP access authorization information (usernames and passwords), and all the data returned from the server to the client." -- Microsoft's IIS 1.0 Features Tour. It has been reported, however, that SSL has been cracked. Private Communication Technology (PCT) is a Microsoft-developed security protocol available in IE only. According to their Internet draft, "The Private Communication Technology (PCT) protocol is designed to provide privacy between two communicating applications (a client and a server), and to authenticate the server and (optionally) the client. PCT assumes a reliable transport protocol (e.g., TCP) for data transmission and reception. The PCT protocol is application protocol-independent. A "higher level" application protocol (e.g., HTTP, FTP, TELNET, etc.) can layer on top of the PCT protocol transparently. The PCT protocol begins with a handshake phase that negotiates an encryption algorithm and (symmetric) session key as well as authenticating a server to the client (and, optionally, vice versa), based on certified asymmetric public keys. Once transmission of application protocol data begins, all data is encrypted using the session key negotiated during the handshake." IE also supports server and client authentication by using digital certificates to identify users to web servers. In addition, IE supports code signing with Authenticode, which verifies that downloaded code has not been modified. For more information on Authenticode, visit Microsoft's Authenticode page or the excellent Authenticode FAQ page. CryptoAPI 1.0 provides the underlying security services for the Microsoft Internet Security Framework. CryptoAPI allows developers to integrate cryptography into their applications. Microsoft has given a great deal of thought to the issue of security and it products, and Internet Explorer 4.0 is no exception. From "Security Zones" to continued support and refinement of Authenticode, IE4 promises to be one of the safest browsers of all time.  You can read all about the security available in IE 4 at http://www.microsoft.com/ie/ie40/?/ie/ie40/features/ie-security.htm. Also, check out what Microsoft is doing to keep transactions private with IE 4.
  • What are "Cookies?" Cookies are small text files that are sent to web browsers by web servers.  The main purpose of cookie files are to identify users and to present customized information based on personal preferences.  Cookie files typically contain information such as your name (or username), password information, or ad-tracking information.  There is a good body of literature on  the Internet about cookies.  Despite what you may have read or heard, most people, including myself, do not view cookies as any kind of a security threat.  However, because of the way cookies work (e.g., a web server storing a text file on someone's hard drive), Microsoft (and other browser manufacturers) have built options into their browsers that notify users when cookies are being passed to them, and give the user an option to prevent the cookie from being accepted.  I don't think this is a good idea.  By rejecting cookies, your browser may not display the entire page or the site may not function as intended. The reality is that cookies are text files -- they cannot contain viruses or execute applications, they cannot search your hard drive for information or send it to web servers, and most of the information they contain is simple tracking information designed to effect better customer service.
  •  
    safe things to do on the Internet and what to learn that is big
Margaret O.

Student Who Created Facebook Group Critical of Teacher Sues High School Over Suspension... - 0 views

  • Student Who Created Facebook Group Critical of Teacher Sues High School Over Suspension
  • A former Florida high school student who was disciplined for "cyberbullying" a teacher on Facebook is suing the school principal on allegations of violating her free speech rights.
  • "We’re in the very first generation of this and there’s nothing ripe for the U.S. Supreme Court to hear," said Frank LoMonte, executive director of the Virginia-based Student Press Law Center.
  • ...4 more annotations...
  • The case highlights the legal challenges facing courts and school administrators as they grapple with campus civil order and free expression in an online world.
  • The lawsuit, filed Monday in a Florida federal court, concerns Katherine Evans, now 19, who was suspended as a senior last year after creating a Facebook group devoted to her English teacher. The group was called "Ms. Sarah Phelps is the worst teacher I’ve ever met!," and featured a photograph of the teacher, and an invitation for other students to "express your feelings of hatred." After people’s comments derided Evans for the online stunt, and expressed support for the teacher, she deleted the group. But Pembroke Pines Charter High School, which did not respond for comment, suspended Evans for three days for "disruptive behavior" and for "Bullying / Cyber Bullying Harassment towards a staff member," according to the lawsuit, which is backed by the American Civil Liberties Union.
  • The lawsuit (.pdf) is one of about a dozen across the United States that are part of the fallout as schools confront cyberbullying and the explosion of social networking sites. A Texas high school volleyball coach in September went so far as to declare a ban on student Facebook and MySpace profiles, a decision the Northside Independent School District reversed (.pdf). Last month, Tennessee State University blocked the online gossip site JuicyCampus at the school firewall. In June, Missouri enacted a law against "cyberbullying" in the wake of the Megan Meier suicide tragedy, which was triggered by a hoax MySpace account.
  • There’s no bright-line rule on what constitutes free, student speech in the online world. And as schools start to regulate off-campus student speech on the internet, lawsuits are following.
  •  
    The internet bullying has got to stop. It's created a dogma for our government: they haven't seen anything like this before and they don't know how to handle it.
Matthew T

Popular virtual worlds for tweens and teens - 0 views

  •  
    This is some more of the virtual worlds teens are on. "Virtual worlds for teens Kids don't outgrow virtual worlds when they hit their teenage years. Many virtual worlds are geared toward the teenage set and they are gaining popularity every day. Meez - With over 80 casual games and multimedia sharing, Meez is a great site for teens. Avatars can navigate different neighborhoods, interact with friends, leave messages and watch videos. Teens can customize avatars that can be exported to other social networks and gaming sites. RuneScape - The RuneScape world is a medieval fantasy realm where players travel through different kingdoms and cities. Users create customizable avatars, fight monsters, complete quests, play games, chat and trade with others, and much more. Both free and premium memberships are available. IMVU - Intended for the teen crowd, IMVU boasts over 100 million users in 88 different countries and has a virtual goods catalog of over 10 million items. Users can search for people based on gender, location and age or join groups based on interests or personal opinions. SuperSecret - In SuperSecret, players start at age 10 and grow up to age 18 by achieving things in a variety of games. As users get older within the games, they get more privileges - at 16 they can drive a virtual car, at 18 they can vote, etc."
Kelby W

Private Internet Browsing - Activating Private Internet Browsing Mode in Your Favorite ... - 0 views

  •  
    Many ways to help you be safe on the internet.   "he term private Internet browsing encompasses a wide array of precautions that Web surfers can take to ensure that their activity on the Web cannot be traced. Motives for private Internet browsing are plenty, with both privacy and safety at the forefront of many Internet users' minds. Whatever the inspiration for browsing anonymously may be, the bottom line is that many people want to avoid leaving tracks behind. Proxy Servers for Private Internet Browsing Private Internet browsing can involve utilizing firewalls and proxy servers to prevent those in the outside world from viewing Web surfing activity, including rogue individuals as well as Internet Service Providers and even the government. These types of private Internet browsing measures are commonly used in countries where access is limited as well as at the workplace or on campus. Private Internet Browsing Within the Web Browser For many Web surfers, however, private Internet browsing involves clearing their tracks from others who may have access to the same computer or mobile device that they're currently using. Most popular Web browsers offer ways to browse anonymously, with no history or other private data such as cache or cookies left behind at the end of your browsing session. How to Activate Private Internet Browsing The methods for activating this type of private Internet browsing differ across browsers, operating systems, and device types. The following step-by-step tutorials teach you how to browse anonymously in the browser of your choice."
Kelby W

Ethical Issues of Internet Privacy - 0 views

  •  
    Internet privacy is a major concern of today. Privacy over the internet has some issues, which need to be dealt with.  "Using the Internet often comprises the use of social networking sites, email facilities and the browse of various other websites. Internet privacy comes on the scene when it comes to website users giving out their personal details on the Internet. For certain websites, which facilitate online shopping, the users are made to input their credit card numbers. In case of emailing sites, there are issues about whether third parties should be allowed to store or read emails without informed consent. Whether or not, the third parties should be permitted to track the visitors on a website, is another major privacy concern. The other important Internet privacy issue is whether the sites that gather personally identifiable information from the users should store or share it. Internet privacy can be considered as a subset of computer privacy. Computer privacy consists of the data privacy relating to the avoidance of the improper disclosure of the personally identifiable information collected and stored by websites. The effective sharing of data while protecting the private information is the real challenge. One school of thought denies the existence of Internet privacy while the other advocates the necessity of the Internet privacy. Complete anonymity is not the intent of Internet privacy. It rather intends to achieve a controlled disclosure of one's personal information. Internet is a network of networks and when a person uses the Internet, he/she connects to it and is identified by an address. In technical terms this address is known as an IP address. For security reasons, a website may wish to track these addresses of its users. Websites may collect the non-personally identifiable information of their users. Such information is the one, which in no way can be used to uniquely identify a person. The disclosure of these forms of information is acceptable
Joshua C

About The Licenses - Creative Commons - 0 views

  •  
    Creative commons are a form of licences that allow for many things to happen with 6 separate licenses. Many for only reproducing and redistributing the product non-commercially, though some can be used for commercial purposes. These license allow for anybody to share reproduce and redistribute the product as long as credit is given to the owner/creator of the copyright. There is three ways they can be read by lawyers and lawmakers the everyday person and machines like computers. This allows for programs to recognize them.
Vicki Davis

Children's Way - Teaching Kids and Parents Internet Safety - 1 views

  •  
    I highly recommend that elementary and middle schools at least sign up for a school code for woogi world - this is a great tool suggested by Hoover City schools for teaching digital citizenship. My daughter (my intrepid tester of all kid virtual worlds) loves it and says she thinks it is great for kids.
  •  
    Great place to teach digital citizenship for students in elementary ages. Schools can sign up for accounts. Excellent place to evaluate as part of how the www is changing the world and how information is moving between children.
Rachel H

ADHD and Internet Addiction - 0 views

  • The Causes of Internet Addiction Although the causes of Internet addiction differ depending on the teen in question, experts at Stone Mountain School, a private boarding school for boys in North Carolina, have observed the following common precursors to Internet addiction: Low self-esteem Poor self-image Lack of achievements Feeling undervalued A feeling of lack of control over one’s life A feeling of being trapped Lack of a structured environment Stress and real-world problems Difficulty making and sustaining relationships Strained home environment Lack of community or friends Difficulty regulating persistent negative emotions Lack of a stimulating learning environment Lack of opportunities for mastery Lack of opportunities for exploration Lack of opportunity to play
  • Although the causes of Internet addiction differ depending on the teen in question, experts at Stone Mountain School, a private boarding school for boys in North Carolina, have observed the following common precursors to Internet addiction: Low self-esteem Poor self-image Lack of achievements Feeling undervalued A feeling of lack of control over one’s life A feeling of being trapped Lack of a structured environment Stress and real-world problems Difficulty making and sustaining relationships Strained home environment Lack of community or friends Difficulty regulating persistent negative emotions Lack of a stimulating learning environment Lack of opportunities for mastery Lack of opportunities for exploration Lack of opportunity to play Warning Signs of Internet Addiction Computers are going to remain a central part of American life, so it is essential for parents to learn ways to monitor their child’s computer use and detect the symptoms of Internet addiction. The experts at Stone Mountain School advise parents to watch for the following signs of Internet addiction: Preoccupation with the Internet Change in eating habits, sleep patterns or school performance Physical ailments such as numbness in the hands, eye strain, weight gain or loss, and headaches, back aches or neck aches Neglecting personal hygiene Missing school or work to surf the Web Refusing to do chores or fulfill other responsibilities because of Internet time Using the Internet longer than allowed or desired An inability to cut back on Internet use Giving up previously enjoyable activities in order to spend more time on the Internet Neglecting friends and family in favor of spending time on the computer Defensiveness or efforts to hide or lie about Internet use Becoming irritable when unable to use the Internet Isolating oneself socially or viewing the Internet as an escape Like other forms of addiction, Internet addicts experience difficulty quitting, tolerance (craving more and more screen time) and withdrawal (irritability, anxiety and boredom) when not using the Internet.
  • Warning Signs of Internet Addiction Computers are going to remain a central part of American life, so it is essential for parents to learn ways to monitor their child’s computer use and detect the symptoms of Internet addiction. The experts at Stone Mountain School advise parents to watch for the following signs of Internet addiction: Preoccupation with the Internet Change in eating habits, sleep patterns or school performance Physical ailments such as numbness in the hands, eye strain, weight gain or loss, and headaches, back aches or neck aches Neglecting personal hygiene Missing school or work to surf the Web Refusing to do chores or fulfill other responsibilities because of Internet time Using the Internet longer than allowed or desired An inability to cut back on Internet use Giving up previously enjoyable activities in order to spend more time on the Internet Neglecting friends and family in favor of spending time on the computer Defensiveness or efforts to hide or lie about Internet use Becoming irritable when unable to use the Internet Isolating oneself socially or viewing the Internet as an escape Like other forms of addiction, Internet addicts experience difficulty quitting, tolerance (craving more and more screen time) and withdrawal (irritability, anxiety and boredom) when not using the Internet.
1 - 20 of 619 Next › Last »
Showing 20 items per page