Skip to main content

Home/ Digiteen/ Group items tagged identity

Rss Feed Group items tagged

October H

Resources: 10 Steps to Protecting Your Computer - 0 views

  •  
    "Everyone must read this! Don't skip it...don't tell yourself that you are safe... Your inaction could cause great harm... At home, your identity, your money, and your personal information could be at risk. At work, your patient's medical information could be at risk!"
  •  
    These are 10 steps to protecting your computer. Are you and your computer safe?
Sophia O

Stories of Cyberbullying: What do they say? - 13 views

What can you do to stop cyberbulling

cyberbulling

Callie S

How to Be Safe on the Internet: 10 steps - wikiHow - 0 views

  • Do not give out your full name, address, or phone number to anyone online
  • Don’t use lazy passwords. Choosing password or 1234 is like putting a luggage lock on the front door of your house. Also, people will be able to guess it and hack. Instead, come up with a longer password that contains both letters and numbers/characters, preferably one that references something significant only to you. For example, if the name of your beloved childhood goldfish was Sir Bubbles, swap out some of the letters for numbers and you can end up with a very nice password like s1rbubb735 that only you understand.
  •  
    "Using the Internet and surfing the web can be as sweet as candy, but not always, as sweet as it is, it's very easy to type in personal information. Here are a few ways to stay safe during your online activities. " steps to learn online safety and rules.
  •  
    If you have a good password that contains numbers and letters your identity is a lot safer.
Savana R

Invading our privacy on the Internet - Los Angeles Times - 0 views

  • privacy is among our inalienable rights
  •  
    People tracking our personal life on the internet can be bad. People can steal other peoples identity. "Internet companies track and sell advertisers virtually everything we do online. That's why a 'do not track me' system is vital. If Washington fails to act, California should create its own system."
Hayes G.

"Internet Scams, Identity Theft, and Urban Legends: Are You at Risk?" - 0 views

  • being smart is NOT enough to protect yourself from dangerous Internet scams, frustrating spam, or devious identity theft
Brody C

digiteen2008 - Digital Security and Safety - 0 views

  • Middle/ High School Aged Students A lot of middle and high school students are members of websites like Myspace and Facebook. To some teens, these websites become addictive and they become so obsessed with talking to people that they start talking to anybody. They need to learn to not put personal information on their page like their phone number or their address because some of the people who look at that would want to hurt them. Another problem with teens is that some of them download illegal music and videos. Two of the most common sites are Frostwire and Limewire. Another thing some teens do is download free software and then their computers run really slow. That's because spyware is usually packaged with the free software. Three ways to keep your computer safe is "only download free software from reputable sites, kids and teens should be told to ask permission before downloading anything, and you can eliminate most spyware by downloading the free Microsoft Windows Defender and scanning your PC." [2]
  • Many people don't realize how important it is to have a secure password. A password is like a key to the door of your personal space on the internet. It is extremely important to keep your password safe. Some ways to choose a secure password are to use a word(s) that is totally unrelated to you. DO NOT use your maiden name, your dogs name, your phone number, your birthday, or any other things that could be related to you. A word on its own isn't very strong, so to increase strength you can add numbers and or symbols. An example of this is if you use the word " apple ", on its own it won't be very secure. If you were to put some numbers and symbols, then it would make it " apple321 " and it would be more secure. If you were to make some of the lower case letters capitals, "aPpLe321 " then it would be even stronger. If you wanted the most secure password possible, then you could insert some symbols, making it " (aPpLe321) "After 30-60 days of using the same password, it would be wise to alter or change your password. You should also use different passwords for different applications. If you would like to test your password, click here
  • 2. How safety and security positively and negatively impacts people How safety & Security positively impacts people you can know where you can rely on some of the website or blogs you feel comfortable to talk to each other sometimes when you are in a reliable website you don't have to tell every single thing about yourself to people online How safety & Security negatively impacts people sometimes strangers can put weird/inappropriate pictures online of you in other sites without your permission you may accidentally reveal your personal information to other strangers and might get in danger people sometimes bully other people they don't know sometimes, the predators make websites to attack you. They make you think the website is reliable and forces you to tell them your personal information
  • ...7 more annotations...
  • Cyber Stalking: This one of the most dangerous things on the internet; people every day are blackmailed into giving personal info like Accounts, credit card numbers, and others info. If you receive or see: · Threatening E-Mails · Post showing you differently to destroy your character · Info About your life posted on the internet
  • Middle/ High School Aged Students Teenagers everywhere use blogs such as Myspace and Facebook. They need to be safe and secure while they do these, as online predators with bad intents can find you if you give to much information. We as teens must obey online laws and common sense.When online teens usually disregard things there parents tell them. Sexual and online predators can ruin a person's childhood if they are able to find them. They can also put the wrong ideas into the minds of children, making them unwanted and bad for your health.
  • Middle/ High School Aged Students Teens use Myspace and Facebook to talk to their friends and stuff. Although, others that they don't know just might become interested in them. Online predators try their best to find out where you live. If they do, it can be bad for your health and childhood. On one website, I found a story in which a real life person fell in love with someone on the Internet. It turned out she left with him for a while and it turned out he was a sexual predator. Always be safe on the Internet.
  • Middle/ High School Aged Students One possible solution is to be safe while blogging. Also, never have a personal meeting. Never include your full name, address, or school, as they can look up your name and find you. Never put pictures online that could help online predators find you. If someone who talks to you online does not seem right or makes you nervous just stop talking to them and tell an adult. Just let them handle it because they are smarter and wiser in those kind of situations.
  • B. Middle / High School Aged Students Teens need to be safe and never give out information Be careful what they download. Be their selves because they don't need to be what they're not. Not talk to strangers.
  • Blogging Tips for Teenagers Being safe on blogs and other websites is very important. I have found some tips to help us be safer on the Internet, which is an important part of a teenager’s everyday life. The first way to be safe is to avoid posts that enable online predators to find and locate you. This means to not give information out like where you go to hang out, your name (last name especially), where your school is and its name, and especially where you live, because everybody can see what you write including the predator. Most people don't know this, but if you give out your phone number, than anybody, including a predator, can type your phone number into google and then they can see where you live. This helps a predator lead straight to you. If someone asks you for private information, DO NOT give it to them. It should be a red flag for you to ignore him or leave the chat room. Also, in chat rooms, if you feel something is going wrong and you feel uncomfortable with anything, leave the chat room immediately. Never have your screen name the same as a nick name. Online predators can sometimes track you down by screen names, which are private unless you give them out. Remember, if your going to have a blog or belong to a chat room, be safe and follow the rules. Also if you find something abnormal online, tell an adult you know and someone you can trust 100%. Always be yourself when on an online blog, which means never put fake information about yourself. In addition, always be respectful to others. If you write a bad comment, it might come back to you. Also, don’t put many pictures about yourself unless you can trust who your sending pictures to. It only helps online predators having a picture of you. Never, never have an in-person meeting. You never know if the person you are meeting has bad intentions. Be honest about your age. If there is an age limit on a chat room then there is probably a reason for one. You never know what you are getting into on the internet. The last tip is that you shouldn't meet anybody without your parent's permission. The reason is because even though you think you know very well the person by catting with them online for few years, it might be the predator that wants to harm you. The predator might told you the false information that he/she is the same age as you or live near your house. So you have to be careful if you are meeting the right person. Adults Although adults are able to have a form of independence, safety and security is very important. They have to be cautious about doing things like online banking or putting personal information online. Adults who put credit card numbers and other personal information should be aware of pharming and phishing. Many adults believe because they are experienced, they know how to be safe. They need to make sure the website they are putting personal information on is secure. You need to look for the "https" at the link of the website. When adults commonly think of online safety they think of online fraud. Identity takers feed off information given out online. If you are a victim of identity fraud it could have an effect on your future. Other than just internet fraud another thing adults have to worry about while online is cyber stalking. Cyber stalking is another way of harassment through the computer. Cyberstalking includes threatening emails, people posting private information about you for others to see, and posing as you online. Many adults seem to feel like they're older so they are less likely at risk for having predators after them. This is not the case. Websites such as eharmony.com and match.com are websites that leave predators open to find people. If you do plan on meeting someone you meet at one of these sites you should make your date at a public place and make sure not to be alone.
  • Digital Security and Safety is an issue that relates to a person's well-being and safety on a computer. Safety and security are two topics that are closely related. Security is the condition of being protected against danger, loss, and criminals. Safety is the condition of being protected against non-desirable events. Some studies have shown "The odds of becoming a cyber victim have dropped to 1 in 6, from 1 in 4 last year.[1] Some examples of potentially unsafe sites online are Facebook and Myspace, which can sometimes can be dangerous because there can be bullying online. On facebook and myspace you can put your picture or pictures on and some people put inapporaite pictures on, which is not safe because thier are always predators out there on the internet and they could see your picture and ask to meet. If you agree to go and meet them then you could be injured.
Julie Lindsay

Going Global, Going Public - 0 views

  •  
    "The real issues of digital citizenship include understanding identity and the opportunities afforded students when teachers teach students to be global citizens. " by Dean Shareski
Steve Madsen

Preteen girls charged over Facebook sex prank - 1 views

  •  
    ""Many kids think that on a social media site that their actions will be anonymous and that they are free to use it as weapon to bully, harass, and intimidate another person. This case demonstrates that assuming the identity of another person on the Internet with the intent to torment them and expose them to the harassment of others is a crime.""
  •  
    This news article may be a bit too much for use in the classroom.
Merritt D

How to be a better Cyber Citizen and stay safe online - Fort Lauderdale Parenting Teens... - 0 views

  •  
    How do your teens treat their friends - online? Teaching our kids and teens respect starts from a young age, however when it comes to technology, parents need to understand it is just as important to continue the lesson of respect digitally.
  •  
    How to be a cyber citizen and stay safe online are major topics in this day and age. Many people (not just teens) need to learn that respect should be carried into the digital world. Ten ways to be a better cyber citizen: 1.) Understand the technology available to protect you and your family's digital identity 2.)Consider using a personal security device when going online 3.)Use antivirus and antispyware software 4.)Teach family & friends about the importance of strong passwords 5.)Get involved in your child's online life 6.)Report cybercrime 7.) Protect your home or small business Wi-Fi network 8.) If you're a parent, consider parental control systems for Internet access on 3G mobile phones 9.) If your bank does not provide a smart bankcard, know the other safe ways to shop online 10.) Don't share information with web sites you don't trust
Callie S

10 Ways Google Recommends You Stay Safe Online | Edudemic - 0 views

  • Passwords are the first line of defense against cyber criminals. It’s important to pick strong passwords that are different for each of your important accounts and to change them regularly. Here are some ideas to help create strong passwords. Use a unique password for all your important accounts. Use unique passwords for your accounts, especially important accounts like email and online banking. You are likely to have dozens of accounts across the web, and you cannot guarantee the security of all of them. Criminals target sites that lack strong security, in order to harvest usernames and passwords that they test against other popular sites. When you use the same password across the web, a cyber criminal can learn the password from a less secure site and then use that password to compromise your important accounts. Use a long password The longer your password is, the harder it is to guess. There are almost one quintillion possible 10-character passwords (that’s 4,000 times as many possibilities as if your password only has eight characters) … and that’s if you only use numbers and letters. Use a password with a mix of letters, numbers, and symbols Using numbers, symbols and mixed-case letters in your password increases the difficulty of guessing or cracking your password. For example, there are more than 6 quadrillion possible variations for an eight-character password with numbers, symbols, and mixed-case letters – 30,000 times more variations than an eight-character password with only lowercase letters. Try using a line from a song, film or play Some passwords are easy to guess or crack: Simple words or phrases like “password” or “letmein,” keyboard patterns such as “qwerty” or “qazwsx,” patterns such as “abcd1234” or personal information like your birthday or street name.So choose a combination of letters, numbers, or symbols to create a unique password that’s unrelated to your personal information.One idea you can try is to choose a line from your favorite song, film or play, like “To be or not to be: That is the question.” Then use numbers, symbols and mixed-case letters to recreate it: “2bon2bT1tq” is a password with quadrillions of variations. The more unusual the phrase you choose the better!Or you could pick a random word or phrase, and insert letters and numbers into the beginning, middle, and end, such as “sPo0kyh@ll0w3En.” Make sure your password recovery options are up-to-date and secure Make sure your recovery email address is up to date so that you can receive emails in case you need to reset your password. Sometimes you can also add a phone number to receive password reset codes via text message. Additionally, many websites (including Google Accounts) will ask you to choose a question to verify your identity if you ever forget your password. If you’re able to create your own question, try to come up with a question that has an answer only you would know. Try to find a way to make your answer unique – you can do this by using some of the tips above – so that even if someone guesses the answer, they won’t know how to enter it properly. Keep your password reminders in a secret place that isn’t easily visible Don’t leave notes with your passwords in plain site, on your computer or desk. If you do decide to save your passwords in a file on your computer, create a unique name for the file so people don’t know what’s inside. Avoid giving the file an obvious name, such as “my passwords.” If you have a difficult time remembering multiple passwords, a trusted password manager may be a good solution. Spend a few minutes checking out the reviews and reputations of these services.
  •  
    To stay safe you need a good password. If you follow these rules when making your password you will have a far less chance of cyber crimes.
Blakelee H

Internet Addiction Left My Brother Homeless - Newsweek and The Daily Beast - 0 views

  • Internet addiction sounds like a punch line. But it ruined my brother's life. Print Email Comments (Page 1 of 3) Last Friday I walked into the most recent inpatient Internet addiction treatment center to open in the United States and asked a really dumb question. "Do you have Wi-Fi here?" I bumbled, prompting an awkward smile from the man who opened the door at the Fall City, Wash.-based ReSTART Internet Addiction Recovery Program. It was the equivalent of walking into an Alcoholics Anonymous meeting and asking for a single-malt Scotch.It was also revealing. I hadn't checked my e-mail, Facebook, or Twitter accounts for nearly 14 hours by the time I showed up at the wooded five-acre retreat, situated with some irony less than 15 miles from Microsoft Corp.'s Redmond headquarters. That drought had begun to eat away at me enough that by the time I walked through the door I was so fixated on plugging back in that my brain was able to push past the blatant insensitivity it took to ask such a question.Most of my friends smirked when I told them I was heading up to Washington to write a story about the newly opened center, which sits on a wooded parcel of property adorned with a 3,500-square-foot craftsman house, Western red cedar treehouses, chicken coops, and goat pens. We all kid about being hooked on Facebook, but it doesn't really seem like the kind of thing anybody would need to drop $14,000 (the cost of a 45-day stay at ReSTART) on to quit cold turkey. The fact is, though, I have believed for some time now that Internet addiction is a very real phenomenon. And not just because I've read stories about the well-established and at-capacity treatment centers in China and South Korea, or because I know antisocial kids who routinely put in 14-hour shifts playing World of Warcraft. Internet addiction is the reason my 36-year-old brother has been homeless for most of his adult life.I hadn't really understood this until recently, because having a homeless brother always terrified me too much to make any real effort to understand why Andrew could never get his life together. A couple of years ago I decided I'd protected myself from this depressing truth long enough. I contacted my brother and said I wanted to spend a day with him, from the moment he awoke to the time he went to sleep, to see what his life was like. I approached the trip with a journalist's curiosity and method—a pen and steno pad—but it was obviously going to be a personal expedition.Andrew, who is four years older than I am, sleeps in a roomy tent, atop three mattresses he's acquired from one place or another, between a set of railroad tracks and Oregon State Highway 99, in a clearing ringed by blackberry bushes. He lives most days the same way. He gets up when he feels like it, walks to the local Grocery Outlet, and uses food stamps to buy a microwaveable meal. Then he treks over to the local soup kitchen and enjoys a free lunch, answering the greetings of his other homeless pals, who speak to me highly of the obese, bearded man they call "Ace."When the rest of his buddies head off to the park to suck down malt liquor or puff weed, Andrew eyes a different fix at the Oregon State University computer lab, which is open to the public. He'll spend the next 10 hours or so there, eyes focused on a computer screen, pausing only to heat up that microwaved meal. He plays role-playing videogames such as World of Warcraft, but he's also got a page of RSS feeds that makes my head spin, filled with blogs he's interested in, news Web sites, and other tentacles into cyberspace. He goes "home" only when the lab closes. He's recently acquired a laptop, after much fundraising from sympathetic relatives, so he can now stay connected day and night, if he can find an open Wi-Fi hot spot.Through the day I peppered him with questions, all meant to answer this one: why had he failed to make something of himself, and I hadn't? It was a complicated question, but it
Alex r

Individual Awareness - 1 views

  •  
    Individuality on a computer
Vicki Davis

Avatars | Mr. Gonzalez's Classroom - 8 views

  •  
    Lots of tools for making avatars! Great blog post! he used everything from Portrait Illustrator to Doppelme to the M&M website! Great post!
  •  
    To protect your identity create an avatar - this website gives you lots of choices for doing this.
Steve Madsen

Pilgrims light up online - 0 views

  •  
    Would-be pilgrims without the time or energy to walk to church now need only a credit card and an internet connection to light a candle in Spain.
  •  
    Is this online presence trustworthy? How safe are your personal details? Can your identity be stolen by using this service?
Dylan Cochrac

Internet safety - Wikipedia, the free encyclopedia - 0 views

  • Internet. safety or online safety is the security of people and their info when using the Internet.
  •  
    "Internet safety or online safety is the security of people and their info when using the Internet. Numerous groups, Internet sites and governments have expressed concerns over the safety of children using the Internet. In the UK the Get Safe Online campaign has received sponsorship from government agency SOCA and major Internet companies such as Microsoft and eBay. Several crimes can be committed on the Internet such as stalking, identity theft and more. Most social networking and chat sites have a page about safety."
  •  
    Internet safety overview
Hayes G.

How to Protect Yourself Online - 0 views

  • Personal firewalls and security software packages (
  • Be Careful What You Download
  • Don't Respond to Emails Requesting Personal Information
  • ...5 more annotations...
  • Log Out Completely. Closing or minimizing your browser
  • The best passwords are ones that are difficult to guess.
  • Using a security token can make it even harder for an identity thief to access your online brokerage account.
    • Hayes G.
       
      ways to protect yourself on the internet
  • Make sure the computer you are using has the latest security patches,
Joseph Edore

Internet Safety | Guest Services | Disney - 0 views

  • Internet Safety Ask Questions The best form of Online Safety begins at home with you, the parent. We offer you the following tips to keep your child safe on the Internet. The best way to know what your child is doing online is to ask. Whether you ask other parents, an Internet-savvy friend, or your child about how they use the Internet asking the right questions will help you understand what your child is doing online so you can make sure they are making safe online choices. Questions to ask your child: What sites do you visit? What do you do on those sites? Why do you go to that site? How much time do you spend on the site? Did you have to register? What information did they ask for? What information did you give? Spend time surfing the Web with your child. This is a great way to learn about what types of interactions your child is having online, and with whom.
  • Communicate Once you have an idea of how your child uses the Internet and what is available to them, you can establish online guidelines and rules. Whether it's setting guidelines about which sites to visit or what's okay to do online, it is essential to clearly communicate the rules to your child. Speak often to your child about potential risks and what to do in various situations. Encourage your child to ask questions about situations they run into. Being aware of the risks your child faces, and communicating frequently with your child about these risks, will help develop their judgment and responsibility about Internet usage.
  • Safety Rules While the Internet offers amazing opportunities for entertainment, education, connectivity, and more, anyone who goes online should understand basic Online Safety. Teaching these basics to your children is essential. When asked by friends or strangers, online or offline, never share Account IDs and Passwords. Don't reveal any personal identity information in your Screen Names, such as your birthday, hobbies, hometown or school. In any information exchange, like e-mail or chat, never give any personal information about yourself or someone else. Don't share photos of yourself, your family, or your home with people you meet online. Never open e-mails that come from unknown sources DELETE them. If you receive mean or threatening comments online, don't respond. Log off and report the activity to your parents. Nothing you write on the Web is completely private. Be careful what you write and to whom. Never make plans to meet an online "friend" in person. WHEN IN DOUBT: Always ask your parents for help. If you're not sure, log off.
Maggie B

Nine Elements - 3 views

  • one has the opportunity to communicate and collaborate with anyone from anywhere and anytime. Unfortunately, many users have not been taught how to make appropriate decisions when faced with so many different digital communicatio
  • communicate with other people. In the 19th century, forms of communication were limited. In the 21st
  • Digital Citizenship
  • ...23 more annotations...
  • citizenship can be defined a
  • to create rules and policy, we must teach everyone to become responsible digital ci
  • l uncomf
  • ic standards of conduct or procedure. Technology users often see this area as one o
  • oral goods and services are surfacing such as pornography and gambling. Users need to learn about how to be effective consumers in a new digital economy. 
  • t economy is being done electronically. Legitimate and legal exchanges are occurring, but the buyer or seller need
  • n electronic society. All people should have fair access to technology no matter who they are.  Places or organizations with limited connectivity need to be addressed as well.  To become productive citizens, we need to be committed
  • norms of appropriate, responsible behavior with regard to technology use. 
  • 1.   Digital Access:   full electronic participation in society. Technology users need to be aware of and support electronic access for all to create a foundation for Digital Citizenship.
  • s the
  • Digital
  • 2.   Digital Commerce:   electronic buying and selling of goods. Technology users need to understand that a large share of marke
  • 3.   Digital Communication:   electronic exchange of information.
  • One of the significant changes within the digital revolution is a person’s ability to
  • offer a wide variety of choices (e.g., e-mail, cellular phones, instant messaging).  The expanding digital communication options have changed everything because people are able to keep in constant communication with anyone else.
  • n options.
  • 4.   Digital Literacy:   process of teaching and learning about technology and the use of technology. While schools have made great progress in the area of technology infusion, much remains to be done. A renewed focus must be made on what technologies must be taught as well as how it should be used.
  • 5. Digital Etiquette:   electron
  • 9.   Digital Security (self-protection):   electronic precautions to guarantee safety.
  • We need to have virus protection, backups of data, and surge control of our equipment. As responsible citizens, we must protect our information from outside forces that might cause disruption or harm.
  • Digital Law:   electronic responsibility for actions and deeds
  • Digital Rights & Responsibilities:   those freedoms extended to everyone in a digital world
  • Digital Health & Wellness:   physical and psychological well-being in a digital technology world.
  •  
    Most people make the wrong health decisions. When they make these decisions, they mess up their whole life. Online health is the same. If you mess up there, you mess up your life.
  • ...2 more comments...
  •  
    "Nine Themes of Digital Citizenship Digital citizenship can be defined as the norms of appropriate, responsible behavior with regard to technology use. 1. Digital Etiquette: electronic standards of conduct or procedure. Technology users often see this area as one of the most pressing problems when dealing with Digital Citizenship. We recognize inappropriate behavior when we see it, but before people use technology they do not learn digital etiquette (i.e., appropriate conduct). Many people feel uncomfortable talking to others about their digital etiquette. Often rules and regulations are created or the technology is simply banned to stop inappropriate use. It is not enough to create rules and policy, we must teach everyone to become responsible digital citizens in this new society. 2. Digital Communication: electronic exchange of information. One of the significant changes within the digital revolution is a person's ability to communicate with other people. In the 19th century, forms of communication were limited. In the 21st century, communication options have exploded to offer a wide variety of choices (e.g., e-mail, cellular phones, instant messaging). The expanding digital communication options have changed everything because people are able to keep in constant communication with anyone else. Now everyone has the opportunity to communicate and collaborate with anyone from anywhere and anytime. Unfortunately, many users have not been taught how to make appropriate decisions when faced with so many different digital communication options. 3. Digital Literacy: process of teaching and learning about technology and the use of technology. While schools have made great progress in the area of technology infusion, much remains to be done. A renewed focus must be made on what technologies must be taught as well as how it should be used. New technologies are finding their way into the work place that are not being used in schools (e.g., videoconfer
  •  
    9 elements to digital citizenship
  •  
    In order for students to be achieve digital citizenship, we must know how to communicate properly.
  •  
    Nine Themes of Digital Citizenship Digital citizenship can be defined as the norms of appropriate, responsible behavior with regard to technology use. 1. Digital Access: full electronic participation in society. Technology users need to be aware of and support electronic access for all to create a foundation for Digital Citizenship.
Ahmed Kiyoshi El Maghraby

stolen credit cards - 0 views

  • stolen card information is being sold on the black market
  • stolen bank account details, email accounts, and even full identities
  • Where once stolen cards used to be used fairly quickly making it easy to detect and cancel the card overseas fraudsters now bought the card details in bulk and stockpiled them for later use, making it difficult to detect where or when the information was stolen.
  • ...1 more annotation...
  • "It's costing banks tens of millions of dollars in Australia and New Zealand alone."
‹ Previous 21 - 40 of 46 Next ›
Showing 20 items per page